GET A DEMO

Handling Vulnerability of Network Security

Every security manager knows that no matter how comprehensive your vulnerability management processes are, your network’s security depends on cooperation between all stakeholders involved in the processes. All too often, IT teams push back against security requests, especially if they feel they are excessive or exaggerated. As a security manager, how do you handle this… Continue reading Handling Vulnerability of Network Security

Vulcan 2019 – A Year In Review Managing Cyber Security

With 2019 coming to a close, it’s a great opportunity for reflection. Looking back – what a year this has been! So many milestones and achievements to be proud of!

Don’t React to the Headlines – Solutions for Cyber Security

Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 million, with larger breaches costing over $100 million before penalties. Vulnerabilities are increasing with roughly 1,000 new ones reported per month. Meanwhile, there’s a shortage of cybersecurity workers; in the US… Continue reading Don’t React to the Headlines – Solutions for Cyber Security

Vulnerability Scanning as the First Step to Risk Remediation

With all the vulnerability remediation suites and individual tools on the market, it can be hard to determine which features and components are essential, which features are merely “nice to have”, and which are a waste of resources. We’ve sorted through the myriad of products and came up with the following list of eight components… Continue reading Vulnerability Scanning as the First Step to Risk Remediation

The Top 5 Free, Open Source Vulnerability Remediation Tools

Vulnerability remediation was once considered a straightforward process. Scanning software identified potential vulnerabilities and notified the system administrator, who took over from there. “Vulnerability” was seen as a coding issue, so manually checking and patching code became the standard method of remediation despite being slow and not always effective.

Exploited Vulnerabilities Drive Remediation Urgencies

Knowing what NOT to do can sometimes be just as helpful as knowing the right thing to do. Oftentimes, CISOs and Vulnerability Managers have plans and practices in place that can actually be making matters worse by focusing on the wrong things. Let’s review some of these mistakes so you can avoid them in your… Continue reading Exploited Vulnerabilities Drive Remediation Urgencies

Top Trends in Cyber Security in 2019

Trends in vulnerabilities and threats evolve as the technology landscape changes. The vulnerability landscape has changed tremendously over the last couple of years which has prompted many organizations to question whether their current methodologies for vulnerability management are sustainable moving forward.

Incident Remediation: A Cure Can’t be Worse Than the Disease

By now, everybody knows that vulnerabilities that aren’t remediated properly could pose a serious threat to the enterprises environment. The data breach experienced by Equifax last year exemplifies the impacts that can occur to a business that fails to remediate. However, we cannot ignore the other side of the coin – when remediation steps ARE… Continue reading Incident Remediation: A Cure Can’t be Worse Than the Disease

Lower Cyber Risk with Threat and Vulnerability Management

In its 2018 “Global Risks Report,” the World Economic Forum – a prominent international policy think-tank – ranked cyber threats just below extreme weather events and natural disasters.