GET A DEMO

Highlights from the December 2022 CyberRisk Summit

Last week, we hosted our fifth semi-annual CyberRisk Summit, a free and virtual event bringing together some of the industry’s leading practitioners to share their knowledge and expertise when it comes to improving security posture. You can watch the full recording here.  This most recent event featured an industry case study from PurpleSec, and showcased… Continue reading Highlights from the December 2022 CyberRisk Summit

Report reveals growing cost of cyber attacks on businesses in 2022

Latest research shows 75% of businesses have been impacted by an IT security vulnerability TEL AVIV, Israel, Dec. 8, 2022 — Vulcan Cyber®, developers of the cyber risk management platform for infrastructure, application, and cloud vulnerabilities, today released Cyber Risk in 2022: a 360° View, a report designed to help organizations develop an actionable, high-level view of the… Continue reading Report reveals growing cost of cyber attacks on businesses in 2022

Threat intelligence frameworks in 2022

Ideally, teams leverage threat intelligence frameworks to more efficiently uncover blind spots, gain visibility, and improve their security posture. And, with threats proliferating every day, even a slight increase in efficiency could be the difference that prevents a data breach.  The key goal, when faced with so many vulnerabilities all at once, is to identify… Continue reading Threat intelligence frameworks in 2022

The Vulcan Cyber website: updates for a changing cyber risk world

You may have noticed something different recently about the Vulcan Cyber website.  If change is the only constant in business, the security posture of business better hold on tight. Every new product, feature, or pivot means a new set of associated cyber risks associated with new, potentially critical, vulnerabilities. Meanwhile, exciting new technologies that open… Continue reading The Vulcan Cyber website: updates for a changing cyber risk world

The real cost of a data breach (according to IBM)

What’s the real cost of a data breach? Cyber security is a game of cat and mouse. Security practitioners and threat actors work to outrun each other, with the ultimate goal of securing – or accessing – critical data. And because so much work goes into protecting assets, practitioners are often stuck in the trenches,… Continue reading The real cost of a data breach (according to IBM)

Vulcan Cyber announced as Optiv Future Point strategic partner

Vulcan Cyber® is proud to be included as one of only four strategic partners in the recently launched Optiv Future Point program, and the only vendor representing the vulnerability remediation category.  The two organizations will work together in driving effective cyber risk management outcomes,  with Vulcan Cyber delivering Optiv customers the capabilities to reduce MTTR, to better… Continue reading Vulcan Cyber announced as Optiv Future Point strategic partner

5 Lessons learned from the CyberRisk Summit

Last week, we held our semi-annual CyberRisk Summit. We brought together our industry’s leading practitioners to discuss the tools, technologies and best practices that they turn to each day to improve their organizations’ security posture.  But if you missed the sessions, don’t worry! We’ve put together this list of the main takeaways from our latest… Continue reading 5 Lessons learned from the CyberRisk Summit

Launching the CyberRisk Summit – sessions to look out for

In the past, Vulcan Cyber has self-hosted the virtual Remediation Summit every six months. This virtual cyber security conference brought together IT security professionals from around the world to share best practices, tools, and technologies, with the ultimate aim of driving improvements in cyber hygiene across their organizations.  A new kind of cyber security conference… Continue reading Launching the CyberRisk Summit – sessions to look out for

Cyber security conferences – 5 of the best virtual events this summer

Cyber risk doesn’t have a calendar. Threats rise and attack surfaces grow, with no regard for the season. It might be getting sunnier outside, but that only leaves more shadows for attackers to lurk in. Today though, IT professionals can stay up to date with emerging trends while also working around their summer plans. Here… Continue reading Cyber security conferences – 5 of the best virtual events this summer

Risk based security: what is it?

Today, teams struggle to manage and mitigate cyber risk, contending with IT environments that sprawl increasingly across siloed teams, tools, and technologies. In short, risk-based security is getting harder.   Traditional vulnerability management was hard enough. Keeping on-premises servers and hosts secure required the sustained efforts of security teams working to prioritize and fix those vulnerabilities… Continue reading Risk based security: what is it?