GET A DEMO

Securing Docker – 6 best practices

Docker containers have revolutionized the software industry. Docker images enable developers using Windows machines to work on applications that use Linux dependencies and different libraries. But with such a large attack surface and the risk of hackers successfully exploiting privileged containers, Securing Docker containers and images is crucial.  Putting containers into production can therefore have… Continue reading Securing Docker – 6 best practices

Patch management mastery: 8 essential best practices for better security

Patch management—the process businesses use to apply fixes or patches to software—sounds straightforward. But in reality, it’s a complex and high-stakes task, especially in a production environment. Complicating factors include the volume of patches, the prioritization of patches, and the choice of when to patch. Streamlining the process with patch management best practices reduces risks… Continue reading Patch management mastery: 8 essential best practices for better security

Vulcan advisors share patch management best practices

We recently asked Vulcan Cyber advisors Brian Lozada, CISO at HBOMax, and Steve Zalewski, former deputy CISO of Levi Strauss, to provide their thoughts on some of the challenges of patch management in an evolving cyber security landscape. Some of their comments were featured in a TechTarget SearchSecurity article titled, “6 Reasons Unpatched Software Persists… Continue reading Vulcan advisors share patch management best practices

Application Security Best Practices

Learn how your own software puts you at risk, and discover Vulcan Cyber’s best practices for application security.

Promote Good Risk Management Process by Avoiding These Five Mistakes

Each data breach in the United States now costs $8.64 million, a 5% increase from 2019 to 2020. New vulnerabilities are disclosed on a daily basis, and old vulnerabilities are still being exploited months and years later. Regulators have been applying stiffer fines whenever personal data security is involved, making risk management process mistakes more… Continue reading Promote Good Risk Management Process by Avoiding These Five Mistakes

Reduce cyber risk with vulnerability remediation

A simple definition for vulnerability remediation is the process of finding the security weak spots in your digital infrastructure, then applying remedies to the most-critical issues as quickly as possible to reduce cyber risk. In practice though, vulnerability remediation is far from straightforward. Remediation to reduce cyber risk isn’t possible without the help of IT… Continue reading Reduce cyber risk with vulnerability remediation

Your Guide to Mastering Vulnerability Assessment Tools

The first part of this blog post series, The Three Stages of Enterprise Vulnerability Remediation, described the most serious challenges facing effective vulnerability remediation—complex infrastructures, distributed applications, and fragmented stacks. In order to pre-empt threats or contain their blast radius, today’s enterprises must have policies, processes, and tools in place to: analyze and assess vulnerabilities,… Continue reading Your Guide to Mastering Vulnerability Assessment Tools

Modernize Your Vulnerability Management System in 2020

Today’s IT environment is markedly different to that of the 90s. While changes to infrastructures and applications have helped us reach new highs, they’ve also brought along several challenges.