Get a demo

The Most Classic Computer Security Threats

Though cyber attacks have become dynamic and more varied in execution, some of the same types of threats still remain. These classic computer security threats first appeared as the internet emerged publicly, but have continued to linger and even evolve. Phishing One of the most famous archetypical computer security threats is the phisher. Phishing is… Continue reading The Most Classic Computer Security Threats

The Six Golden Rules of Risk Management in Cyber Security

Risk management in cyber security involves identifying risks, risk assessment, prioritization and determining how to respond in the event that risks turn into reality. To keep your business safe, here are six rules to consider to ensure effective cybersecurity risk management:  Prepare For Your Risk Assessment First and foremost, risk management involves risk assessment. Identifying… Continue reading The Six Golden Rules of Risk Management in Cyber Security

The Best Network Scanning Tools to Kickstart Your Vulnerability Remediation

What are Network Scanning Tools? Network scanning tools help to assess risks to your organization’s network and plan remediations. Although network scanning is a useful tool, it can often get complicated when you are working in a large organization where hundreds of networks are connected. Listed below are some of our favorite network scanning tools… Continue reading The Best Network Scanning Tools to Kickstart Your Vulnerability Remediation

How to fix the returning CVE-2013-0229 & CVE-2012-5958

There’s a saying: “Everything old is new again.” That may be fine when it comes to fashion and nostalgic movies, but when it comes to “vintage” vulnerabilities, the situation can quickly become dangerous. When a vulnerability like CVE-2013-0229 or CVE-2012-5958 goes unremediated for an extended period of time, sometimes it can be forgotten entirely, or… Continue reading How to fix the returning CVE-2013-0229 & CVE-2012-5958

Application Security programs in 2021

Application security has emerged as a popular target for attackers in 2021. Developers continue to release new features and capabilities at pace, leaving security gaps ready to be exploited. But as the list of vulnerabilities grows, are security professionals keeping up? Consolidating data from Forrester, Barracuda, Edgescan, and our own research with Pulse – this… Continue reading Application Security programs in 2021

PCI DSS 4.0 – everything you need to know (July 2022)

Following years of rumors, the Payment Card Industry Security Standards Council (PCI SSC) is now targeting a Q1 2022 publication date for the release of PCI DSS 4.0, the newest iteration of its globally standardized data security standards. This will be the first full update of PCI DSS since 2015, and raises new questions for… Continue reading PCI DSS 4.0 – everything you need to know (July 2022)

Risk Management, Risk Assessment, Risk Remediation: What are the differences?

‘Risk assessment’, ‘risk management’, and ‘risk remediation’ are often tossed around as synonyms, but that doesn’t mean the words are interchangeable. They are all critical terms when it comes to addressing security vulnerabilities.  Risk Management Risk management is the umbrella category risk assessment and remediation fall under. It is the macro-level process of assessing, analyzing,… Continue reading Risk Management, Risk Assessment, Risk Remediation: What are the differences?

The top 5 most dangerous cyber security threats

What are  cyber security threats? Cyber security threats are vulnerabilities that live in your network, infrastructure, cloud, or applications that pose a risk to your organization’s assets.  The FBI’s Internet Crime Complaint Center (IC3) released a report revealing over $10 billion in losses from the 800,000+ cyberattack complaints they received in 2022. As threats become… Continue reading The top 5 most dangerous cyber security threats

CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it

Vulcan Cyber is your security partner when it comes to identifying and fixing vulnerabilities. One of the ways we give back to the community is through Vulcan Remedy Cloud, the world’s largest free and curated database of reliable vulnerability solutions. Vulcan Remedy Cloud offers you detailed information to help your team remediate today’s most concerning… Continue reading CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it