New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Cyber Security Automation: When to Automate Your Vulnerability Management Program

Vulnerability management (VM) stakeholders continue to struggle to keep up with the criminals, mainly due to the growing volume of attacks, and the lack of cyber security automation. According to Edgescan, on average it takes organizations 84 days to remediate high risk vulnerabilities—an almost three-month window during which networks and data can be compromised. The… Continue reading Cyber Security Automation: When to Automate Your Vulnerability Management Program

Promote Good Risk Management Process by Avoiding These Five Mistakes

Each data breach in the United States now costs $8.64 million, a 5% increase from 2019 to 2020. New vulnerabilities are disclosed on a daily basis, and old vulnerabilities are still being exploited months and years later. Regulators have been applying stiffer fines whenever personal data security is involved, making risk management process mistakes more… Continue reading Promote Good Risk Management Process by Avoiding These Five Mistakes

Vulcan Challenges A Vulnerability Management Program

Vulcan Cyber Maturity Model Challenges Vulnerability Management Programs to Evolve New Vulcan Cyber eBook provides a blueprint for achieving advanced levels of cyber hygiene by progressing from vulnerability management to vulnerability remediation

Vulcan Cyber and Financial Cyber Security

All aspects of the financial services industry—from banking to securities, and from insurance to pensions—are highly regulated at multiple levels. These regulations have two primary objectives: to protect customers from fraudulent or negligent behavior, and to safeguard transactions and data.

It’s for an Automated Vulnerability Management Program

Managing your vulnerabilities – from identification and prioritization all the way through to remediation and resolution, is an extremely time-consuming task. This is why Vulnerability Managers need to find ways to take the most mundane, repetitive aspects of vulnerability management such as scanning and opening tickets and integrate them into an efficient process. In 2019,… Continue reading It’s for an Automated Vulnerability Management Program

Cut Costs With Automated Vulnerability Remediation

Now more than ever, budgetary decisions and allocations are critical. When it comes to IT, with each team, department, and business unit convinced that its requirements are paramount, budgetary decisions must be based on quantifying, comparing, and prioritizing the business value to the enterprise. Management must ask itself to what extent does any given budget… Continue reading Cut Costs With Automated Vulnerability Remediation

Enterprise Security: Deja Vu All Over Again?

The 1990s: When Remediation was Simple Back in the 1990s, every company’s network was fairly self-contained, using relatively few third-party programs with little direct contact with the developing internet, especially during work hours. Corporate email domains were completely separate from personal ones, such as AOL, Yahoo! mail or invitation-only Gmail. 

Secure DevOps Mindset Through Continuous Development and VM

With the advent of the cloud computing movement, organizations have been shifting to managed infrastructures to offset IT costs. Yet in a complex and ever changing multi-OS environment, patching is not always so easy. Different operating systems and cloud environments as well as the potential of spanned on-premise and cloud environments further complicate the patching… Continue reading Secure DevOps Mindset Through Continuous Development and VM

Don’t React to the Headlines – Solutions for Cyber Security

Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 million, with larger breaches costing over $100 million before penalties. Vulnerabilities are increasing with roughly 1,000 new ones reported per month. Meanwhile, there’s a shortage of cybersecurity workers; in the US… Continue reading Don’t React to the Headlines – Solutions for Cyber Security

Vulnerability Scanning as the First Step to Risk Remediation

With all the vulnerability remediation suites and individual tools on the market, it can be hard to determine which features and components are essential, which features are merely “nice to have”, and which are a waste of resources. We’ve sorted through the myriad of products and came up with the following list of eight components… Continue reading Vulnerability Scanning as the First Step to Risk Remediation