Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>

Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>

Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

TRY VULCAN FREE

Block Threat Vectors with Three-Step Vulnerability Remediation

The primary objective of vulnerability remediation is to pre-empt breaches before the vulnerabilities in data, applications, networks, or endpoints are exploited. Should a breach occur, however, then the objective of vulnerability remediation is to contain it as quickly as possible and thus minimize the damage.

The Best Data Breach Response from CEOs

The massive “Collection #1” breach of 2019 exposed 772,904,991 unique emails and 21,222,975 unique passwords. The data appears to have been taken from a number of sources, meaning a number of CEOs faced the same question that Mark Zuckerburg, John Legere (Tmobile), Paul Black (Allscripts), Steve Long (Hancock Health), Matt Raoul (Timehop) and others have… Continue reading The Best Data Breach Response from CEOs

Network Attack Types Employed by Superstar Hackers

You might think that the hackers bringing down organizations and infrastructures are government trained, highly advanced coders. The truth is far less dramatic- but of far greater concern to security professionals. Many powerful exploits have found their way into the hands of amateurs, who would never have been able to create them themselves. It’s the… Continue reading Network Attack Types Employed by Superstar Hackers

The Worst Data Breaches of the Decade

With nearly 15,000 new vulnerabilities discovered in 2017, and even more expected this year – the competition for ‘worst vulnerability’ is a tough one to judge. The discovery of serious, severe or even critical vulnerabilities is a daily occurrence – and thus ranking them by level of infamy is an elusive challenge.