ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

Addressing security gaps with risk-based vulnerability management

Considering the enormous damage that comes with a breach of personal financial data, it’s critical for financial institutions to implement a robust cyber risk management program that takes into account the unique challenges of their environments. This white paper explores the top cyber security risks that practitioners face and how a risk-based vulnerability management approach can help close security gaps brought on… Continue reading Addressing security gaps with risk-based vulnerability management

SANS vulnerability management survey 2022

While vulnerability management processes are growing more mature, many organizations continue to struggle with the sheer volume of information. Even as vulnerability management programs improve and grow more sophisticated, IT security teams must employ more efficient measures to make the most of the vulnerability information they are receiving. This white paper – produced in partnership… Continue reading SANS vulnerability management survey 2022

Exploit maturity: an introduction

IT Security teams know that fixing all vulnerabilities is impossible. The goal is not to fix everything, but to mitigate the cyber risk with the most impact. Exploit maturity helps us make sense of the most pressing threats by providing us with an understanding of the real risk posed by any given vulnerability. This white… Continue reading Exploit maturity: an introduction

A step-by-step guide to achieve vulnerability management success

Read the eBook to understand the four stages of cyber risk success: Reactive; Data-driven; Orchestrated; Transformative. Learn the behaviors and benefits of each stage, and discover how your organization can move from “Reactive” to “Transformative” with this Vulcan Cyber eBook, to more effectively protect your business from security threats.

Secure coding best practices

Developers are essential players when it comes to delivering new products and features. But they are also integral to ensuring security within applications. Vulnerable code can easily open the door to greater cyber risk, and developers must stay vigilant and put security first. This isn’t an easy challenge given that they are understandably not cyber… Continue reading Secure coding best practices

Vulnerability management – cloud and remote working

For many organizations, vulnerability management remains a big concern. Security teams are accountable, but not responsible, for much of the risk mitigation process, and struggle to communicate its importance to different teams and stakeholders. Migration to the cloud has not helped this. While identifying vulnerabilities has become more straightforward, fixing them and managing the cyber… Continue reading Vulnerability management – cloud and remote working

Mapping CVEs to the MITRE ATT&CK framework

The cyber security industry is embracing and standardizing on the MITRE ATTACK framework, and concurrently we understand that vulnerability management by itself is not enough. We must combine risk-based vulnerability management with MITRE ATT&CK to expand our visibility and control of CVEs. This white paper explores how the Vulcan Cyber Voyager18 research team mapped relevant… Continue reading Mapping CVEs to the MITRE ATT&CK framework

How organizations can avoid cyber negligence

Attack surfaces have never been bigger, and cyber security teams are quickly overwhelmed by a growing threatscape. It’s easy to fall into a trap of cyber negligence, reacting from one crisis to another. But this is an unsustainable, short-sighted approach. This white paper – based on a Remediation Summit session from Ryan Gurney (CISO-in-residence at… Continue reading How organizations can avoid cyber negligence

The best free and open source tools for cyber risk assessment and mitigation

The number of newly disclosed vulnerabilities has been growing year after year for more than a decade. With so many new vulnerabilities to fix a notable number of free and open source tools have become available to help get fix done. This white paper breaks down the most useful free and open source helping IT… Continue reading The best free and open source tools for cyber risk assessment and mitigation

How to avoid a paper tiger vulnerability management program

As attack surfaces grow and vulnerabilities mount, organizations look to their vulnerability management programs to respond to threats and keep them secure. But not all VM programs are created equal. In fact, many are limited in what they can offer in answer to security gaps in their unique environments. This white paper explains why some… Continue reading How to avoid a paper tiger vulnerability management program