ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

ChatGPT for cyber risk management: an opportunity, or a threat? | Read here >>

CVE-2022-3656 in Google Chrome: How to fix the new “SymStealer” vulnerability | Read here >>

New report: Get a 360° view of the cyber risk landscape in 2022 and recommendations for 2023 | See the full report >> 

6 cyber security trends for 2023: what to expect

Charting the future trajectory of cyber security is a tall order. The rapid proliferation of new attack surfaces means more opportunities for threat actors than ever before, and this will only continue as new technologies are introduced. Still, there are some things we can confidently predict for the coming year, given that they are trends… Continue reading 6 cyber security trends for 2023: what to expect

Vulcan Cyber to present at upcoming cyber security webinars focused on cloud risk management, Log4Shell mitigation, and breach prevention

TEL AVIV, Israel, Feb. 15, 2022 /PRNewswire/ — Vulcan Cyber®, developers of the industry’s only cyber risk management platform for infrastructure, application, and cloud security, today announced Vulcan Cyber executives and experts will participate in three upcoming cyber security webinars: the SANS Institute Log4Shell Vulnerability Solutions Forum, BrightTalk Breach Prevention, Detection and Response Summit, and the Cloud Security… Continue reading Vulcan Cyber to present at upcoming cyber security webinars focused on cloud risk management, Log4Shell mitigation, and breach prevention

Integrate CI Tools with VM for Risk Remediation

Continuous integration and continuous delivery and/or deployment (CI/CD) has become a staple within the modern software development landscape, and it is now extending into patch management. The importance of your environment’s security cannot be overstated, nor can the difficulty of maintaining that security. The question then becomes: What exactly is CI/CD and how can you… Continue reading Integrate CI Tools with VM for Risk Remediation