New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Known vulnerabilities – threat actors’ best friends

Delve into the minds of threat actors by joining us on Thursday, January 13, to watch a session from The Remediation Summit by Yossi Glazer, Vulcan Cyber principal product manager, titled, “A Threat Actor’s Perspective on Risk.”  It’s no surprise that threat actors look to take advantage of exposed public-facing assets, often exploiting known vulnerabilities.… Continue reading Known vulnerabilities – threat actors’ best friends

Operational challenges in mitigating log4j

2021 left a final, chaotic surprise for the cyber security community with the unprecedented critical zero day log4j vulnerabilities. The remediation scramble in the immediate aftermath brought significant operational challenges. Teams worldwide were suddenly caught off-guard, working around the clock to fix a vulnerability nobody saw coming. Here are some of the key logistical and… Continue reading Operational challenges in mitigating log4j

Remote Work and its Impact on Information Security Risk Management

COVID-19’s widespread impacts were felt not only in everyday life but also at the workplace. The pandemic caused a total shift to remote work almost instantaneously, giving businesses little time to adapt their security plans as they moved to adopt cloud-based technologies and collaboration sites. It’s no surprise that a remote work environment results in… Continue reading Remote Work and its Impact on Information Security Risk Management

The Risk Threat Vulnerability Equation

Risk = Threat + Vulnerability The Risk Threat Vulnerability Equation is a commonly used formula in cyber risk management to identify and prioritize the risks organizations face. This model illustrates that if one aspect of risk, such as threat or vulnerability, can be brought down to a manageable level, the value of risk as a… Continue reading The Risk Threat Vulnerability Equation

Our Favorite Free Open Source Threat Intelligence Feeds

Threat intelligence feeds record and track IP addresses and URLs associated with phishing scams, malware, bots, trojans, adware, spyware, ransomware, and more. While there are plenty available online, we thought we would share our favorites. Proofpoint’s Emerging Threats Proofpoint’s Emerging Threats Intelligence Feed (ET) is one of the highest-rated threat intelligence feeds. ET categorizes and… Continue reading Our Favorite Free Open Source Threat Intelligence Feeds

Your Guide to a Successful Security Vulnerability Assessment

To provide your organization with the necessary knowledge to understand the threats to its environment, your SOC team must know the ins and outs of performing successful security vulnerability assessments. Having a clear understanding of vulnerability assessment can provide significant value to an organization. Here are the essential steps for performing a vulnerability assessment.  Initial… Continue reading Your Guide to a Successful Security Vulnerability Assessment

How Can a Network Vulnerability Scanner Benefit You?

Network vulnerability scanning is the process of providing businesses with an in-depth review by identifying security holes within an organization’s network, information systems, and hardware. Vulnerability scanning is then followed by employing strategies to remediate these gaps.  Network vulnerability scanners are crucial in allowing businesses to determine which security measures to implement. If performed regularly… Continue reading How Can a Network Vulnerability Scanner Benefit You?

Your network security audit checklist

Performing a network security audit is an effective way to monitor and evaluate the health of your network infrastructure. Check out our 10 step checklist so you can take your network from uncomfortably vulnerable to confidently secure.  1. Define the scope of the audit Decide which devices, operating systems, and access layers should be included… Continue reading Your network security audit checklist

New Threats To Network Security on the Scene

We are never surprised by new threats to network security. The cybersecurity landscape is so dynamic, attackers are constantly adapting.  In order to keep up, we need to adapt too. Here are four threats that have developed in the past few years of network security:  Problem: DDoS attacks—getting bigger and bigger. DDoS is Distributed Denial… Continue reading New Threats To Network Security on the Scene