GET A DEMO

Vulcan and beyond: Introducing our updated messaging

You may have noticed some messaging changes to our website. You might have seen that the messaging on our homepage looks a bit different, and that our platform and solution pages have been updated. That our tagline, get fix done, which has loyally represented us as the maverick challengers to the stale vulnerability management industry,… Continue reading Vulcan and beyond: Introducing our updated messaging

CVE-2017-14491 and CVE-2019-0708: a blast from the past

Vulcan Cyber is on a mission to help businesses own and mitigate risk. That’s why we do our own research on the most searched CVEs to make sure our community is up to date with the industry’s latest concerns. SEO tool Ahrefs has shown us that in the last few weeks, CVE-2017-14491 and CVE-2019-0708, two… Continue reading CVE-2017-14491 and CVE-2019-0708: a blast from the past

Multi-cloud security: what you need to know

The multi-cloud approach is becoming increasingly popular among companies looking to take advantage of its agility, innovation, potential cost savings, and the flexibility to choose the best of what each cloud provider has to offer based on your needs. According to Gartner’s 2020 survey, 81% of public cloud users reported they were using the services… Continue reading Multi-cloud security: what you need to know

Vulcan advisors share patch management best practices

We recently asked Vulcan Cyber advisors Brian Lozada, CISO at HBOMax, and Steve Zalewski, former deputy CISO of Levi Strauss, to provide their thoughts on some of the challenges of patch management in an evolving cyber security landscape. Some of their comments were featured in a TechTarget SearchSecurity article titled, “6 Reasons Unpatched Software Persists… Continue reading Vulcan advisors share patch management best practices

The State of Enterprise Cloud Security Programs in 2021

As companies accelerate their transition to the cloud, teams face a new category of cyber attack. This poses new problems and threatens the stability of enterprise workloads, and worse – client data. The benefits of cloud environments are clear, but the consequences of ineffective enterprise cloud security programs cast a dark shadow.  Using data from… Continue reading The State of Enterprise Cloud Security Programs in 2021

The Cyber Security Vulnerability Dictionary

Cyber security can be a daunting topic given the complex jargon used by professionals. To help, we’ve created a cyber security vulnerability dictionary with the most commonly used terms for you. AI: Any device that perceives its environment and takes actions that maximize its chance of success at some goal. Blue Team: A group of… Continue reading The Cyber Security Vulnerability Dictionary

What to Look For in Enterprise Risk Management Software

Enterprise Risk Management (ERM) software is a key component in cybersecurity and protecting your data. In simple terms, ERM helps minimize financial, strategic, and operational risks. Without ERM, your business lies susceptible to data breaches which often go undetected until it’s far too late.  Now that you understand the importance of ERM, you’ll need to… Continue reading What to Look For in Enterprise Risk Management Software

The Most Classic Computer Security Threats

Though cyber attacks have become dynamic and more varied in execution, some of the same types of threats still remain. These classic computer security threats first appeared as the internet emerged publicly, but have continued to linger and even evolve. Phishing One of the most famous archetypical computer security threats is the phisher. Phishing is… Continue reading The Most Classic Computer Security Threats

The Six Golden Rules of Risk Management in Cyber Security

Risk management in cyber security involves identifying risks, risk assessment, prioritization and determining how to respond in the event that risks turn into reality. To keep your business safe, here are six rules to consider to ensure effective cybersecurity risk management:  Prepare For Your Risk Assessment First and foremost, risk management involves risk assessment. Identifying… Continue reading The Six Golden Rules of Risk Management in Cyber Security

The Best Network Scanning Tools to Kickstart Your Vulnerability Remediation

What are Network Scanning Tools? Network scanning tools help to assess risks to your organization’s network and plan remediations. Although network scanning is a useful tool, it can often get complicated when you are working in a large organization where hundreds of networks are connected. Listed below are some of our favorite network scanning tools… Continue reading The Best Network Scanning Tools to Kickstart Your Vulnerability Remediation