New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

CI/CD security – 5 best practices

Alongside the rapid adoption of CI/CD (continuous integration and continuous delivery or deployment) over the past decade has been a surge in security threats. The need for a robust security policy is essential to thwarting potential threats. In this article, we’ll cover the basics of CI/CD security, and the various ways to integrate risk-based vulnerability… Continue reading CI/CD security – 5 best practices

CWE top 25 most dangerous software weaknesses in 2022 – what they mean

As application development accelerates, so must security within this environment. Fortunately, there are many tools and resources to help security teams navigate the increasing threatscape of application security, not least from MITRE, who have released their latest list of software vulnerabilities.  Here’s everything you need to know about the 2022 CWE top 25 most dangerous… Continue reading CWE top 25 most dangerous software weaknesses in 2022 – what they mean

App security prioritization: the top inputs

With the demand for high-performing, user-friendly applications at an all-time high, developers are now using different programming languages to gain a competitive edge. The downside, however, is that this can lead to app security issues, which are often overlooked. But security is also a key factor when it comes to your application’s success. A securely… Continue reading App security prioritization: the top inputs

SDLC best practices for more secure coding

As the threat landscape grows and the costs of data breaches increase, organizations are looking to adopt secure software development lifecycle (SDLC) best practices and methodoligies. Secure SDLC is a multi-step approach that comprises a set of rules, procedures, and standards that govern the secure software development processes within your organization, focusing on the integration… Continue reading SDLC best practices for more secure coding

Application Security Best Practices

Learn how your own software puts you at risk, and discover Vulcan Cyber’s best practices for application security.

Cyber Security Automation: When to Automate Your Vulnerability Management Program

Vulnerability management (VM) stakeholders continue to struggle to keep up with the criminals, mainly due to the growing volume of attacks, and the lack of cyber security automation. According to Edgescan, on average it takes organizations 84 days to remediate high risk vulnerabilities—an almost three-month window during which networks and data can be compromised. The… Continue reading Cyber Security Automation: When to Automate Your Vulnerability Management Program

Vulcan Cyber and Financial Cyber Security

All aspects of the financial services industry—from banking to securities, and from insurance to pensions—are highly regulated at multiple levels. These regulations have two primary objectives: to protect customers from fraudulent or negligent behavior, and to safeguard transactions and data.