Whether your organization was born in the cloud or is aiming to modernize its IT landscape through cloud adoption, having a well-defined and comprehensive cloud security program is crucial. Managing security in the cloud calls for different strategies than managing security in networks or applications surfaces, and requires a paradigm shift due to the constantly… Continue reading 5 GCP Security Tools You Should Know About (July 2022 update)
At Vulcan Cyber, we keep our finger on the pulse of the cyber security field and a big part of that is getting a real-time understanding of which vulnerabilities are considered most crucial for the industry at any given time. Based on Q1 2021 visitor statistics for Vulcan Remedy Cloud, SolarWinds Orion API and Windows… Continue reading SolarWinds Orion API & Windows DNS are the most visited vulnerabilities on Remedy Cloud
The COVID-19 pandemic has created a need for security teams to make sudden adjustments to many of their processes. This article focuses on vulnerability and patch management processes specifically, and discusses how companies can ensure that these programs keep their digital environments and assets secure while dealing with a larger than ever remote workforce.
The first part of this blog post series, The Three Stages of Enterprise Vulnerability Remediation, described the most serious challenges facing effective vulnerability remediation—complex infrastructures, distributed applications, and fragmented stacks. In order to pre-empt threats or contain their blast radius, today’s enterprises must have policies, processes, and tools in place to: analyze and assess vulnerabilities,… Continue reading Your Guide to Mastering Vulnerability Assessment Tools