GET A DEMO

How to secure your Azure environments fast

As cyber risks and attacks in the cloud increase, integrating security into your cloud blueprints from day one has become non-negotiable. This is true especially of Azure, widely used globally for cloud environments. The shared responsibility model in cloud computing assumes that customers will implement the required security guardrails provided by the platform or by… Continue reading How to secure your Azure environments fast

Cloud application security: a cheatsheet

With the majority of companies today relying on applications in an ever-changing business landscape, this has created a need for dynamic application development. At the same time, the need for speed to market in product development has pushed organizations to look for infrastructure and development environments that enable faster and more efficient deployment of new… Continue reading Cloud application security: a cheatsheet

The AWS security cheat sheet

Like the other Big 3 CSPs, AWS follows a shared responsibility model and offers security guardrails to protect the platform and the underlying hardware. Nonetheless, AWS customers are expected to implement native or third-party security measures in order to keep their cloud workloads secure. Which security measures you’ll need to implement will depend on the… Continue reading The AWS security cheat sheet

Challenges of cloud security (5 traps to avoid) – August 2022

It’s no surprise that one of the biggest concerns for companies using the cloud – whether they were born in the cloud or migrated to one – is the attached challenges of cloud security, specifically when “operating in the dark”. There are many reasons for cloud security blind spots: poor infrastructure visibility, dark data, misconfigurations,… Continue reading Challenges of cloud security (5 traps to avoid) – August 2022

Risk based security: what is it?

Today, teams struggle to manage and mitigate cyber risk, contending with IT environments that sprawl increasingly across siloed teams, tools, and technologies. In short, risk-based security is getting harder.   Traditional vulnerability management was hard enough. Keeping on-premises servers and hosts secure required the sustained efforts of security teams working to prioritize and fix those vulnerabilities… Continue reading Risk based security: what is it?

Vulcan Cyber Integrates with Amazon Inspector for AWS Cloud Security

TEL AVIV, Israel — November 29, 2021 —  Vulcan Cyber, developers of the cyber risk management platform for infrastructure, application, and cloud security, today announced an integration with the new Amazon Inspector. Through this integration Vulcan Cyber and Amazon Web Services (AWS) customers can aggregate vulnerability data from multiple sources to establish a comprehensive approach to… Continue reading Vulcan Cyber Integrates with Amazon Inspector for AWS Cloud Security