Vulnerability scan data is useful in determining and evaluating whether your system is susceptible to threats, how severe these vulnerabilities are, and how to remediate them if needed. Here are five sources for vulnerability assessments that can provide the data you need to protect your system. Host-based Assessment: Host-based assessments and scanners are used to… Continue reading Tap These Sources Today to Make Vulnerability Scan Data Useful and Actionable
There’s a saying: “Everything old is new again.” That may be fine when it comes to fashion and nostalgic movies, but when it comes to “vintage” vulnerabilities, the situation can quickly become dangerous. When a vulnerability like CVE-2013-0229 or CVE-2012-5958 goes unremediated for an extended period of time, sometimes it can be forgotten entirely, or… Continue reading How to fix the returning CVE-2013-0229 & CVE-2012-5958
Application security has emerged as a popular target for attackers in 2021. Developers continue to release new features and capabilities at pace, leaving security gaps ready to be exploited. But as the list of vulnerabilities grows, are security professionals keeping up? Consolidating data from Forrester, Barracuda, Edgescan, and our own research with Pulse – this… Continue reading Application Security programs in 2021
Following years of rumors, the Payment Card Industry Security Standards Council (PCI SSC) is now targeting a Q1 2022 publication date for the release of PCI DSS 4.0, the newest iteration of its globally standardized data security standards. This will be the first full update of PCI DSS since 2015, and raises new questions for… Continue reading PCI DSS 4.0 – everything you need to know (July 2022)
‘Risk assessment’, ‘risk management’, and ‘risk remediation’ are often tossed around as synonyms, but that doesn’t mean the words are interchangeable. They are all critical terms when it comes to addressing security vulnerabilities. Risk Management Risk management is the umbrella category risk assessment and remediation fall under. It is the macro-level process of assessing, analyzing,… Continue reading Risk Management, Risk Assessment, Risk Remediation: What are the differences?
What are cyber security threats? Cyber security threats are vulnerabilities that live in your network, infrastructure, cloud, or applications that pose a risk to your organization’s assets. As threats are becoming more serious, every organization must clearly understand the severity of its vulnerabilities – and act on them with appropriate methodologies. The types of attacks… Continue reading The top five most dangerous cyber security threats
Vulcan Cyber is your security partner when it comes to identifying and fixing vulnerabilities. One of the ways we give back to the community is through Vulcan Remedy Cloud, the world’s largest free and curated database of reliable vulnerability solutions. Vulcan Remedy Cloud offers you detailed information to help your team remediate today’s most concerning… Continue reading CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it