TEL AVIV, JUNE 6, 2022 – Vulcan Cyber, developers of the cyber risk management platform for infrastructure, application, and cloud security, today announced the company has been recognized as a Next Gen Risk Management company in the 10th Annual Global InfoSec Awards from Cyber Defense Magazine, to be awarded at RSA Conference 2022. “We’re proud… Continue reading Vulcan Cyber named winner of a Global InfoSec Awards at RSA Conference 2022
Recently, CISA added 95 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The catalog is a living list of known CVEs that represent significant risk to federal enterprises, and is regularly updated. But while new vulnerabilities are added constantly, it’s unusual for CISA to add more than a handful to their catalog at a time,… Continue reading CISA known exploited vulnerabilities – what do they mean for your organization?
If you use computers for business or personal use, you know that computer security is a high priority. Even if you use anti-virus software, cyber attacks are common. These threats are pervasive in nature and are often financially motivated. If you’re a business owner, you need to be on high alert when it comes to… Continue reading What Is remediation in cyber security?
In terms of tech transformation, all organizations are faced with the same questions: How can we become more agile? How can we release more quickly? How can we do more faster, more flexibly? But these questions fail to address the fact that security must remain in step with accelerating development – a unique challenge for… Continue reading How to achieve risk-based application security as a team
Vulcan Cyber Survey Finds Most Risk-based Vulnerability Management Programs to be Ineffective Latest research shows risk-based vulnerability management programs are not doing enough to correlate vulnerability data with actual business risk leaving organizations exposed TEL AVIV, Dec. 16, 2021 – Vulcan Cyber®, developers of the industry’s only cyber risk management platform for infrastructure, application, and… Continue reading Vulnerability Management Programs Are Broken – Data Suggests
Last month, the US Cybersecurity and Infrastructure Security Agency (CISA) issued a new directive requiring federal agencies to patch known exploited vulnerabilities within specific timeframes. With this directive, CISA also published the Known Exploited Vulnerabilities Catalog. While a welcome move, these vulnerability reports are not enough on its own to change the cyber risk status… Continue reading CISA and NIST compile ominous vulnerability reports
Vulcan Cyber to Spotlight Modern Cyber Risk Management at The Remediation Summit Cybersecurity leaders from Best Buy and YL Ventures will join Vulcan Cyber to discuss risk prioritization and mitigation for application, IT and cloud security TEL AVIV, Israel — December 2, 2021 — Vulcan Cyber®, developers of the industry’s only cyber risk management platform… Continue reading Vulcan Cyber to Spotlight Modern Cyber Risk Management at The Remediation Summit
Vulcan Cyber Announces Integration with Amazon Inspector to Deliver Orchestrated Cyber Risk Management for AWS Cloud Security Integration enables AWS users to filter, prioritize, and coordinate actionable campaigns for effective risk mitigation and AWS Cloud security TEL AVIV, Israel — November 29, 2021 — Vulcan Cyber, developers of the cyber risk management platform for infrastructure, application,… Continue reading Vulcan Cyber Integrates with Amazon Inspector for AWS Cloud Security
Businesses have increasingly moved their services from their independent networks to cloud environments provided by SaaS providers in recent times, especially with the transition to remote work. The shift to cloud technology has raised key issues in cybersecurity as attackers find more ways to infiltrate and threaten the safety of your data. Having an established… Continue reading Dynamic Security Risk Assessment by Your Team
In the evolving digital landscape, cybersecurity risk assessments are vital to keeping your data safe from potential threats. In particular, cyber risk assessments help identify and assess current safety protocols to determine necessary updates to keep attackers at bay. The Cyber Risk Assessment Checklist: Asset Audit Determine the assets to be assessed; focus on… Continue reading The Cyber Risk Assessment Checklist