Vulnerability Assessment, Management, and Remediation: Understanding the Differences

Posted by Yaniv Bar-Dayan on Oct 4, 2018 9:36:38 AM

 

As a CISO or Security Manager, you understand your organization’s need to remain one step ahead of cybercriminals searching for gaps in your security posture. The market is flooded with solutions for dealing with vulnerabilities and the challenge continues to be understanding the ways to best prioritize and manage the vulnerabilities. But first, to keep your organization safe, it’s imperative that you understand the differences between the three main types of security solutions: vulnerability assessment, vulnerability management, and vulnerability remediation tools.

Read More

Topics: vulnerability remediation, vulnerabilities

Five Steps to Lower Cyber Risk with Better Vulnerability Management

Posted by Roy Horev on Sep 13, 2018 9:54:51 AM

 

In its 2018 “Global Risks Report,” the World Economic Forum – a prominent international policy think-tank – ranked cyber threats just below extreme weather events and natural disasters.

Read More

Topics: Cybersecurity, vulnerability remediation, Patching

Putting Meltdown and Spectre in Perspective, Six Months Later

Posted by Tal Morgenstern on Aug 14, 2018 9:19:49 AM

 

For several months in early 2018, you could not open a browser without seeing news about Spectre and Meltdown – the variants of a vulnerability built in to just about every computer chip on the planet. Discovered in late 2017 by researcher Michael Schwarz at Graz University of Technology in Austria, Spectre and Meltdown actually comprise three vulnerabilities (CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754).

Read More

Topics: vulnerability remediation, Meltdown and Spectre

Always Brush Your Digital Teeth: Why You Should Maintain Good Cyber Hygiene

Posted by Yaniv Bar-Dayan on Aug 1, 2018 8:00:30 AM

 

With proper cyber hygiene, you can control IT processes - rather than being controlled by endless (and unhygienic) vulnerabilities.

Read More

Topics: vulnerabilities, vulnerability remediation

How to Start the Transition from Risk Management to Vulnerability Remediation

Posted by Tal Morgenstern on Jul 24, 2018 6:37:36 AM

Just five years ago, the vulnerability landscape looked markedly different. There were fewer vulnerabilities to patch and risk was far lower - since most systems were still on-premise and the overall cyber-threat climate was calmer.

Read More

Topics: vulnerability remediation

Cyber Risk Management is not the Goal

Posted by Yaniv Bar-Dayan on Jul 19, 2018 8:26:50 AM

 

As we discussed in a previous post, a tsunami of known vulnerabilities is flooding businesses worldwide. In fact, the number of vulnerabilities reported to date in 2018 (8138 as of this writing) far outstrips the total number of vulnerabilities reported in all of 2016 (6447). We’re only halfway through the year, so it’s fair to estimate that the total for EOY 2018 will top last year’s record of over 14,600 reported vulnerabilities.

Enterprises are understandably concerned about the management and remediation of so many vulnerabilities with such detrimental potential. Risk analysis services and technologies offered by both veteran and newer players are among the solutions CSOs and other network stakeholders are considering. In this post, we’ll take a look at these services, and examine their (few) pluses and (very prominent) minuses.

Read More

Topics: vulnerability remediation

The Top 7 Vulnerabilities of the Decade

Posted by Roy Horev on Jul 11, 2018 7:14:47 AM

 

With nearly 15,000 new vulnerabilities discovered in 2017, and even more expected this year – the competition for ‘worst vulnerability’ is a tough one to judge. The discovery of serious, severe or even critical vulnerabilities is a daily occurrence – and thus ranking them by level of infamy is an elusive challenge.

Read More

Topics: vulnerability remediation, vulnerabilities

Your Vulnerability Management Processes are Broken

Posted by Tal Morgenstern on Jun 28, 2018 7:38:40 AM

 

There’s no other way to state it: Existing vulnerability management processes are broken. Current vulnerability management paradigms are not keeping up with threats. Attacks similar to WannaCry and Petya, which exploited the Eternal Blue vulnerability, could happen again at any time.

Read More

Topics: vulnerability remediation

The Origins of the Vulnerability Flood

Posted by Yaniv Bar-Dayan on Jun 25, 2018 9:40:00 AM

 

According to CVE Details, the number of vulnerabilities reported to date in 2018 (6559) already tops the total number of vulnerabilities reported in all of 2016 (6447). If nothing dramatic changes, the list seems on track to at least match last year’s record of over 14,600 reported vulnerabilities, if not to top it.

Read More

Topics: vulnerability remediation

Launching Vulcan Cyber

Posted by Yaniv Bar-Dayan on Jun 21, 2018 5:16:17 AM

 

“Don’t wake a sleeping lion.”

This was the reaction my two co-founders Tal Morgenstern, Roy Horev, and I had gotten over and over again when sharing with our colleagues our intention to establish Vulcan Cyber.

“There are so many other problems, why this one?”

Well, for me the answer was clear. I knew that solving this problem would profoundly change the face of cybersecurity. And that was enough.

Read More

Topics: vulnerability remediation