New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Challenges of cloud security (5 traps to avoid) – August 2022

It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached challenges of cloud security, specifically when “operating in the dark”. There are many reasons for cloud security blind spots: poor infrastructure visibility, dark data, misconfigurations,… Continue reading Challenges of cloud security (5 traps to avoid) – August 2022

Compliance in the cloud: 5 things you need to know

Cloud transformation offers many benefits to the modern enterprise. But it also presents significant challenges. It takes a lot of research and planning. It calls for expertise in the new cloud-based model of delivering IT. And it can potentially involve a significant amount of application redesign and coding work. But it also requires a fresh… Continue reading Compliance in the cloud: 5 things you need to know

How Cloud Vendors Confront Cloud Migration Challenges

The major cloud service providers (CSPs) and other tech giants are stepping up their security game – introducing native offerings to aid their customers in the face of cloud migration challenges. In this blog post, we’ll cover the world of cloud security. Its early days, where it’s headed, and what users can do to stay… Continue reading How Cloud Vendors Confront Cloud Migration Challenges

5 Azure Security Tools You Should Know About

As an increasing number of organizations adopt cloud as the target platform for their business critical workloads, securing these workloads has become a top priority. Establishing a well-defined risk management strategy that covers the entire stack—infrastructure, the application layer, and cloud-specific security controls—is the first step in improving your company’s cyber hygiene. If you are… Continue reading 5 Azure Security Tools You Should Know About

Remediating the MITRE framework and att&ck with VM

Update June 2022: The Vulcan Cyber research team, aka “Voyager18” has worked on mapping CVEs to relevant tactics and techniques from the MITRE ATT&CK matrix. Visit the dedicated site here.    While vulnerability management isn’t natively mapped to the MITRE ATT&CK framework by default, using cyber knowledge, data science, machine learning and artificial intelligence, CVEs can be efficiently integrated with ATT&CK in a way that delivers distinct advantages… Continue reading Remediating the MITRE framework and att&ck with VM