GET A DEMO

How to fix the returning CVE-2013-0229 & CVE-2012-5958

There’s a saying: “Everything old is new again.” That may be fine when it comes to fashion and nostalgic movies, but when it comes to “vintage” vulnerabilities, the situation can quickly become dangerous. When a vulnerability like CVE-2013-0229 or CVE-2012-5958 goes unremediated for an extended period of time, sometimes it can be forgotten entirely, or… Continue reading How to fix the returning CVE-2013-0229 & CVE-2012-5958

Application Security programs in 2021

Application security has emerged as a popular target for attackers in 2021. Developers continue to release new features and capabilities at pace, leaving security gaps ready to be exploited. But as the list of vulnerabilities grows, are security professionals keeping up? Consolidating data from Forrester, Barracuda, Edgescan, and our own research with Pulse – this… Continue reading Application Security programs in 2021

PCI DSS 4.0 – everything you need to know (July 2022)

Following years of rumors, the Payment Card Industry Security Standards Council (PCI SSC) is now targeting a Q1 2022 publication date for the release of PCI DSS 4.0, the newest iteration of its globally standardized data security standards. This will be the first full update of PCI DSS since 2015, and raises new questions for… Continue reading PCI DSS 4.0 – everything you need to know (July 2022)

Risk Management, Risk Assessment, Risk Remediation: What are the differences?

‘Risk assessment’, ‘risk management’, and ‘risk remediation’ are often tossed around as synonyms, but that doesn’t mean the words are interchangeable. They are all critical terms when it comes to addressing security vulnerabilities.  Risk Management Risk management is the umbrella category risk assessment and remediation fall under. It is the macro-level process of assessing, analyzing,… Continue reading Risk Management, Risk Assessment, Risk Remediation: What are the differences?

The top 5 most dangerous cyber security threats

What are  cyber security threats? Cyber security threats are vulnerabilities that live in your network, infrastructure, cloud, or applications that pose a risk to your organization’s assets.  The FBI’s Internet Crime Complaint Center (IC3) released a report revealing over $10 billion in losses from the 800,000+ cyberattack complaints they received in 2022. As threats become… Continue reading The top 5 most dangerous cyber security threats

CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it

Vulcan Cyber is your security partner when it comes to identifying and fixing vulnerabilities. One of the ways we give back to the community is through Vulcan Remedy Cloud, the world’s largest free and curated database of reliable vulnerability solutions. Vulcan Remedy Cloud offers you detailed information to help your team remediate today’s most concerning… Continue reading CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it