The CyberRisk Summit is back: Join us on Dec 6. as we recap the cyber risk landscape in 2022 | Get free ticket >> 

Live webinar, Oct 13: Attend to learn how you can deduplicate vulnerability and deliver a smarter approach to cyber risk management  | Register  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Challenges of cloud security (5 traps to avoid) – August 2022

It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached challenges of cloud security, specifically when “operating in the dark”. There are many reasons for cloud security blind spots: poor infrastructure visibility, dark data, misconfigurations,… Continue reading Challenges of cloud security (5 traps to avoid) – August 2022

Enhancing cloud security with Vulcan Cyber Risk Management Platform and Amazon Inspector Integration

Today, AWS introduced the new Amazon Inspector, a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. In this blog post we will cover the new Vulcan Cyber with Amazon Inspector aimed at enhancing security for both AWS and Vulcan Cyber customers. The need for risk-based cloud security programs… Continue reading Enhancing cloud security with Vulcan Cyber Risk Management Platform and Amazon Inspector Integration

Compliance in the cloud: 5 things you need to know

Cloud transformation offers many benefits to the modern enterprise. But it also presents significant challenges. It takes a lot of research and planning. It calls for expertise in the new cloud-based model of delivering IT. And it can potentially involve a significant amount of application redesign and coding work. But it also requires a fresh… Continue reading Compliance in the cloud: 5 things you need to know

How Cloud Vendors Confront Cloud Migration Challenges

The major cloud service providers (CSPs) and other tech giants are stepping up their security game – introducing native offerings to aid their customers in the face of cloud migration challenges. In this blog post, we’ll cover the world of cloud security. Its early days, where it’s headed, and what users can do to stay… Continue reading How Cloud Vendors Confront Cloud Migration Challenges

9 AWS Security Tools You Should Know About

AWS is one of the most popular cloud service providers among enterprises and SMBs for hosting mission-critical workloads. Like Azure and GCP, AWS follows a shared responsibility model for security in the cloud: As the cloud service provider, AWS manages and owns security of the platform, while customers are responsible for all application, infrastructure, and… Continue reading 9 AWS Security Tools You Should Know About

Remediating the MITRE framework and att&ck with VM

Update June 2022: The Vulcan Cyber research team, aka “Voyager18” has worked on mapping CVEs to relevant tactics and techniques from the MITRE ATT&CK matrix. Visit the dedicated site here.    While vulnerability management isn’t natively mapped to the MITRE ATT&CK framework by default, using cyber knowledge, data science, machine learning and artificial intelligence, CVEs can be efficiently integrated with ATT&CK in a way that delivers distinct advantages… Continue reading Remediating the MITRE framework and att&ck with VM