Roy Horev

Recent Posts

A History of Vulnerability Management

Posted by Roy Horev on Mar 14, 2019 9:02:15 AM

The number of known vulnerabilities has exploded in recent years. With enterprises using more software solutions, open-source, cloud, Internet of Things, and more, it’s no wonder the increase in security flaws has skyrocketed.

Read More

Topics: vulnerabilities, Cybersecurity

How can Enterprises Stop Failing their Vulnerability Management Teams?

Posted by Roy Horev on Mar 7, 2019 8:33:55 AM

Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But the problem goes beyond the continuous growth in vulnerabilities.

Read More

Topics: vulnerability remediation, vulnerabilities, DevSecOps

Why Response is the Most Difficult Part of Vulnerability Management

Posted by Roy Horev on Feb 21, 2019 10:15:00 AM

“If it were easy, everyone would do it.”

With the never-ending headlines of major breaches caused by vulnerabilities, it’s clear that vulnerability management isn’t easy. According to the Ponemon Institute, the average total cost of a breach in 2018 ranged from between  2-7 million dollars, depending on the number of compromised records.

Read More

Topics: vulnerability remediation, vulnerabilities

Vulcan Cyber's Must Attend Events for CISOs in 2019

Posted by Roy Horev on Feb 12, 2019 10:00:00 AM

No matter what IT field you work in, staying on top of the latest technologies and trends is a must, especially in cybersecurity. Just as a good security plan requires continuous monitoring, a good CISO needs continuous learning. A top-notch security conference can be the most efficient and effective way for CISOs to stay current while networking with peers.

Read More

Topics: Cybersecurity

Saving Time and Money with Vulnerability Remediation at Scale

Posted by Roy Horev on Feb 7, 2019 7:21:06 AM

Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands affected every cloud-native SaaS or enterprise company. Some of these vulnerabilities were only potentially dangerous, but others affected tens of thousands of customers.

Read More

Topics: vulnerability remediation, vulnerabilities

Patch Management Best Practices for Production Environments

Posted by Roy Horev on Jan 23, 2019 6:49:55 AM

 

On the surface, patch management sounds like a straightforward task. But patching in a production environment means making a change to potentially every device in the enterprise. Let’s take a look at some of the complex challenges of patching production environments and some ways to improve the process.

Read More

Topics: Patching

Security and DevOps: Getting them to Work Together

Posted by Roy Horev on Dec 27, 2018 9:39:40 AM

DevOps has revolutionized the pace at which new iterations of applications are released to meet the needs of customers. By nature, security teams are focused on securing company assets and data, which others may see as a roadblock to productivity. The tension between these two groups can sometimes be palpable.

Read More

Topics: DevSecOps, Cybersecurity

Vulnerability Trends to Watch Out for in 2019

Posted by Roy Horev on Dec 20, 2018 7:51:53 AM

Trends in vulnerabilities and threats evolve as the technology landscape changes. The vulnerability landscape has changed tremendously over the last couple of years which has prompted many organizations to question whether their current methodologies for vulnerability management are sustainable moving forward.

Read More

Topics: vulnerabilities

Vulnerability Metrics - Which Matter and Which Don't

Posted by Roy Horev on Nov 1, 2018 1:39:51 PM

The best way to share information about the risks associated with vulnerabilities is via quantifying these risks – i.e. metrics. The question is, which metrics? In order to communicate a cohesive vulnerability narrative, in this post we’ve grouped some of the more common metrics – with the aim of helping you leverage the most useful ones, and steer clear of those that are not.

Read More

Topics: vulnerabilities

A Closer Look at Vulnerability Disclosure Policies

Posted by Roy Horev on Oct 17, 2018 4:48:34 AM

 

While technology companies aim to ensure that their products are watertight, the fact of the matter is that security vulnerabilities are discovered. But how they deal with these discoveries varies considerably.

The question is: should technology vendors keep vulnerabilities quiet or make them known?

Read More

Topics: vulnerabilities