Attack technique alert: Vulcan Cyber discovered that AI package hallucination open developers to malicious attacks | Learn more >>

OWASP top 10 LLM risks: Discover the OWASP top 10 LLM risks for 2023 and the steps we can take to prevent them | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

Attack technique alert: Vulcan Cyber discovered that AI package hallucination open developers to malicious attacks | Learn more >>

OWASP top 10 LLM risks: Discover the OWASP top 10 LLM risks for 2023 and the steps we can take to prevent them | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

TRY VULCAN FREE

Patch management mastery: 8 essential best practices for better security

Patch management—the process businesses use to apply fixes or patches to software—sounds straightforward. But in reality, it’s a complex and high-stakes task, especially in a production environment. Complicating factors include the volume of patches, the prioritization of patches, and the choice of when to patch. Streamlining the process with patch management best practices reduces risks… Continue reading Patch management mastery: 8 essential best practices for better security

Cyber Security Automation: When to Automate Your Vulnerability Management Program

Vulnerability management (VM) stakeholders continue to struggle to keep up with the criminals, mainly due to the growing volume of attacks, and the lack of cyber security automation. According to Edgescan, on average it takes organizations 84 days to remediate high risk vulnerabilities—an almost three-month window during which networks and data can be compromised. The… Continue reading Cyber Security Automation: When to Automate Your Vulnerability Management Program

Promote Good Risk Management Process by Avoiding These Five Mistakes

Each data breach in the United States now costs $8.64 million, a 5% increase from 2019 to 2020. New vulnerabilities are disclosed on a daily basis, and old vulnerabilities are still being exploited months and years later. Regulators have been applying stiffer fines whenever personal data security is involved, making risk management process mistakes more… Continue reading Promote Good Risk Management Process by Avoiding These Five Mistakes

Vulcan Challenges A Vulnerability Management Program

Vulcan Cyber Maturity Model Challenges Vulnerability Management Programs to Evolve New Vulcan Cyber eBook provides a blueprint for achieving advanced levels of cyber hygiene by progressing from vulnerability management to vulnerability remediation

Vulcan Cyber and Financial Cyber Security

All aspects of the financial services industry—from banking to securities, and from insurance to pensions—are highly regulated at multiple levels. These regulations have two primary objectives: to protect customers from fraudulent or negligent behavior, and to safeguard transactions and data.

It’s for an Automated Vulnerability Management Program

Managing your vulnerabilities – from identification and prioritization all the way through to remediation and resolution, is an extremely time-consuming task. This is why Vulnerability Managers need to find ways to take the most mundane, repetitive aspects of vulnerability management such as scanning and opening tickets and integrate them into an efficient process. In 2019,… Continue reading It’s for an Automated Vulnerability Management Program

Cut Costs With Automated Vulnerability Remediation

Now more than ever, budgetary decisions and allocations are critical. When it comes to IT, with each team, department, and business unit convinced that its requirements are paramount, budgetary decisions must be based on quantifying, comparing, and prioritizing the business value to the enterprise. Management must ask itself to what extent does any given budget… Continue reading Cut Costs With Automated Vulnerability Remediation

Enterprise Security: Deja Vu All Over Again?

The 1990s: When Remediation was Simple Back in the 1990s, every company’s network was fairly self-contained, using relatively few third-party programs with little direct contact with the developing internet, especially during work hours. Corporate email domains were completely separate from personal ones, such as AOL, Yahoo! mail or invitation-only Gmail. 

Secure DevOps Mindset Through Continuous Development and VM

With the advent of the cloud computing movement, organizations have been shifting to managed infrastructures to offset IT costs. Yet in a complex and ever changing multi-OS environment, patching is not always so easy. Different operating systems and cloud environments as well as the potential of spanned on-premise and cloud environments further complicate the patching… Continue reading Secure DevOps Mindset Through Continuous Development and VM

Don’t React to the Headlines – Solutions for Cyber Security

Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 million, with larger breaches costing over $100 million before penalties. Vulnerabilities are increasing with roughly 1,000 new ones reported per month. Meanwhile, there’s a shortage of cybersecurity workers; in the US… Continue reading Don’t React to the Headlines – Solutions for Cyber Security