New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

In large friendly letters – making sense of cyber vulnerabilities

There is a well-known travel guide that is popular, in part, because it has “Don’t Panic” embossed conspicuously on the cover. In the world of cybersecurity, where new vulnerabilities and new attacks are announced on an almost daily basis, it’s a phrase we should take to heart. While we need to be aware of evolving cyber… Continue reading In large friendly letters – making sense of cyber vulnerabilities

Vulcan Cyber Adds Customizable Risk Modeling to its Risk Remediation Platform

Vulcan Cyber Adds Customizable Risk Modeling to its Risk Remediation Platform Vulcan Cyber now offers customizable vulnerability prioritization to help security and IT operations teams secure digital infrastructure through targeted remediation Tel Aviv – July 1, 2020 – Vulcan Cyber®, developers of the industry’s only end-to-end risk remediation platform, today announced customers can now add… Continue reading Vulcan Cyber Adds Customizable Risk Modeling to its Risk Remediation Platform

Enterprise Security: Deja Vu All Over Again?

The 1990s: When Remediation was Simple Back in the 1990s, every company’s network was fairly self-contained, using relatively few third-party programs with little direct contact with the developing internet, especially during work hours. Corporate email domains were completely separate from personal ones, such as AOL, Yahoo! mail or invitation-only Gmail. 

Don’t React to the Headlines – Solutions for Cyber Security

Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 million, with larger breaches costing over $100 million before penalties. Vulnerabilities are increasing with roughly 1,000 new ones reported per month. Meanwhile, there’s a shortage of cybersecurity workers; in the US… Continue reading Don’t React to the Headlines – Solutions for Cyber Security

Prioritizing Risk with Vulcan Remediation Orchestration

By this point, we’re all well aware of the torrents of vulnerabilities out there and the pressure that they impose on CISOs and security teams. That’s why incorporating automation methodologies into the vulnerability remediation processes has become key to handling the current threat landscape safely and consistently. And not just for efficiency’s sake. As Larry… Continue reading Prioritizing Risk with Vulcan Remediation Orchestration

Make CVSS Scores Work for Your Risk Management Program

The number of vulnerabilities uncovered daily has long exceeded what security teams can possibly address. The key to success in vulnerability management no longer lies in patching everything, but rather in making judgment calls and deciding which vulnerabilities to address and which to ignore.

Your Vulnerability Management Process Isn’t Working

It’s the question that plagues every CISO: “Have I done enough?” First, you’ve convinced your partners in the boardroom that vulnerabilities are a serious matter and increased your security budget. Then, you’ve managed to create a collaborative relationship between IT and security teams, coordinating code scans and implementing patches. But every now and then it’s… Continue reading Your Vulnerability Management Process Isn’t Working

How Enterprise IT Security Can Tackle Cyber Security Issues

Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But the problem goes beyond the continuous growth in vulnerabilities.

Save Time and Money Fixing that Software Vulnerability

Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands affected every cloud-native SaaS or enterprise company. Some of these vulnerabilities were only potentially dangerous, but others affected tens of thousands of customers.

Evaluating Vulnerability Management Metrics that Matter Most

The best way to share information about the risks associated with vulnerabilities is via quantifying these risks – i.e. metrics. The question is, which metrics? In order to communicate a cohesive vulnerability narrative, in this post we’ve grouped some of the more common metrics – with the aim of helping you leverage the most useful… Continue reading Evaluating Vulnerability Management Metrics that Matter Most