Get a demo

The state of vulnerability management programs in 2021

It’s no surprise that 2021 saw a record number of vulnerabilities. It reflects a worrying trend of an expanding attack surface and limited security resources. But even the best-equipped IT security teams are faced with the issue of not fully understanding their risk when it comes to vulnerability management.  With data from Gartner, other industry… Continue reading The state of vulnerability management programs in 2021

The most talked about CVEs for Q4 2021 (that aren’t Log4j)

This year has featured one security headline after another, with attacks by advanced persistent threats (APTs), a barrage of CVEs in Microsoft products, attacks on infrastructure, supply chain, and MSPs, along with increasing refinement in social engineering and other trajectories.  That’s to say nothing of the recent critical Log4j vulnerabilities that shook the cyber security… Continue reading The most talked about CVEs for Q4 2021 (that aren’t Log4j)

Most risk-based vulnerability management programs are ineffective

Latest research shows IT security teams are not doing enough to correlate vulnerability data with actual business risk leaving organizations exposed. TEL AVIV, Israel — December 16, 2021 — According to a Vulcan Cyber survey of more than 200 enterprise IT and security executives conducted by Pulse, 86% of respondents rely on third-party vulnerability severity… Continue reading Most risk-based vulnerability management programs are ineffective

Vulcan and beyond: Introducing our updated messaging

You may have noticed some messaging changes to our website. You might have seen that the messaging on our homepage looks a bit different, and that our platform and solution pages have been updated. That our tagline, get fix done, which has loyally represented us as the maverick challengers to the stale vulnerability management industry,… Continue reading Vulcan and beyond: Introducing our updated messaging

CVE-2017-14491 and CVE-2019-0708: a blast from the past

Vulcan Cyber is on a mission to help businesses own and mitigate risk. That’s why we do our own research on the most searched CVEs to make sure our community is up to date with the industry’s latest concerns. SEO tool Ahrefs has shown us that in the last few weeks, CVE-2017-14491 and CVE-2019-0708, two… Continue reading CVE-2017-14491 and CVE-2019-0708: a blast from the past

Multi-cloud security: what you need to know

The multi-cloud approach is becoming increasingly popular among companies looking to take advantage of its agility, innovation, potential cost savings, and the flexibility to choose the best of what each cloud provider has to offer based on your needs. According to Gartner’s 2020 survey, 81% of public cloud users reported they were using the services… Continue reading Multi-cloud security: what you need to know

Vulcan advisors share patch management best practices

We recently asked Vulcan Cyber advisors Brian Lozada, CISO at HBOMax, and Steve Zalewski, former deputy CISO of Levi Strauss, to provide their thoughts on some of the challenges of patch management in an evolving cyber security landscape. Some of their comments were featured in a TechTarget SearchSecurity article titled, “6 Reasons Unpatched Software Persists… Continue reading Vulcan advisors share patch management best practices

The State of Enterprise Cloud Security Programs in 2021

As companies accelerate their transition to the cloud, teams face a new category of cyber attack. This poses new problems and threatens the stability of enterprise workloads, and worse – client data. The benefits of cloud environments are clear, but the consequences of ineffective enterprise cloud security programs cast a dark shadow.  Using data from… Continue reading The State of Enterprise Cloud Security Programs in 2021

The Cyber Security Vulnerability Dictionary

Cyber security can be a daunting topic given the complex jargon used by professionals. To help, we’ve created a cyber security vulnerability dictionary with the most commonly used terms for you. AI: Any device that perceives its environment and takes actions that maximize its chance of success at some goal. Blue Team: A group of… Continue reading The Cyber Security Vulnerability Dictionary

What to Look For in Enterprise Risk Management Software

Enterprise Risk Management (ERM) software is a key component in cybersecurity and protecting your data. In simple terms, ERM helps minimize financial, strategic, and operational risks. Without ERM, your business lies susceptible to data breaches which often go undetected until it’s far too late.  Now that you understand the importance of ERM, you’ll need to… Continue reading What to Look For in Enterprise Risk Management Software

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.

View more
Accept
Decline