Request a Demo
With the ephemeral nature of containers, you might think that patching is far less critical than it really is. But in fact, as with more traditional ...
Read more

03.3.2020 | vulnerabilities , Ghostcat

Posted by Yonatan Amitay
The Apache Tomcat servers that have been released over the last thirteen years are vulnerable to a bug called “Ghostcat” that allows hackers to take ...
Read more

02.27.2020 | Regulation

Posted by Roy Horev
The rapid increase in fraud and business interruption caused by cyber attacks is behind the growing focus on security—particularly personal data ...
Read more
Every security manager knows that no matter how comprehensive your vulnerability management processes are, your network’s security depends on ...
Read more

01.30.2020 | RSA , RSA Innovation Sandbox

Posted by Vulcan Cyber
Continuing to rack up accolades for automating the remediation process of vulnerabilities at speed and scale, Vulcan Cyber is named one of the 10 ...
Read more
The first part of this blog post series, The Three Stages of Enterprise Vulnerability Remediation, described the most serious challenges facing ...
Read more
Alert: There's a new zero-day RCE on Windows Internet Explorer, CVE-2020-0674, with no available patches out there yet. Not only that, as of now ...
Read more
The US Cybersecurity and Infrastructure Security Agency (CISA) had alerted organizations to patch their Pulse Secure VPN servers as a defense against ...
Read more
Improving vulnerability management and remediation processes is a task that requires cybersecurity pros to actively keep up with the latest ...
Read more
Posted by Yaniv Bar-Dayan
With 2019 coming to a close, it’s a great opportunity for reflection. Looking back - what a year this has been! So many milestones and achievements ...
Read more
Posted by Roy Horev
Continuous integration and continuous delivery and/or deployment (CI/CD) has become a staple within the modern software development landscape, and it ...
Read more

12.18.2019 | vulnerabilities

Posted by Tal Morgenstern
As 2019 draws to a close, we want to look back at the year’s biggest security breaches. Some we chose because of the damage they caused, others ...
Read more

12.11.2019 | Windows Patching

Posted by Roy Horev
With new vulnerabilities and threats constantly making headlines, frequent patch releases is a must for operating systems. Keeping software and ...
Read more
The Cybersecurity and Infrastructure Security Agency (CISA) is responsible for building America’s “national capacity to defend against cyber-attacks ...
Read more

11.28.2019 | vulnerability remediation

Posted by Roy Horev
The primary objective of vulnerability remediation is to pre-empt breaches before the vulnerabilities in data, applications, networks, or endpoints ...
Read more
In a previous blog on challenges in today’s security environment, we discussed the shortage of cybersecurity personnel - in the US alone, 3.5 million ...
Read more

11.12.2019 | Patch Managment

Posted by Roy Horev
Patching has become particularly challenging in the new cloud and hybrid-cloud environments— especially across Windows and Linux—despite the many ...
Read more
The 1990s: When Remediation was Simple Back in the 1990s, every company’s network was fairly self-contained, using relatively few third-party ...
Read more

11.3.2019 | Linux , Workarounds

Posted by Navot Yellin
The team responsible for sudo, a popular Linux command-line tool, published a new security alert under CVE-2019-14287. It has a high CVSS score of ...
Read more
New exploit published for a Group Policy vulnerability disclosed back in 2015, allows remote code execution on vulnerable version of Windows. While ...
Read more

10.30.2019 | DevSecOps , Patch Managment

Posted by Roy Horev
With the advent of the cloud computing movement, organizations have been shifting to managed infrastructures to offset IT costs. Yet in a complex and ...
Read more
Posted by Vulcan Cyber
TEL AVIV, Oct. 24, 2019 -- Israeli startup Vulcan Cyber, helping enterprises close the cybersecurity vulnerability remediation gap, has been named a ...
Read more
Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 ...
Read more
With all the vulnerability remediation suites and individual tools on the market, it can be hard to determine which features and components are ...
Read more
The massive “Collection #1” breach of 2019 exposed 772,904,991 unique emails and 21,222,975 unique passwords. The data appears to have been taken ...
Read more
Posted by Yaniv Bar-Dayan
Highlights: Brings total raised in one year to $14 million for expansion of North American operations and R&D  Mark Hatfield, general partner at Ten ...
Read more

06.13.2019 | vulnerabilities , Cybersecurity

Posted by Roy Horev
You might think that the hackers bringing down organizations and infrastructures are government trained, highly advanced coders. The truth is far ...
Read more
By this point, we’re all well aware of the torrents of vulnerabilities out there and the pressure that they impose on CISOs and security teams. ...
Read more

05.29.2019 | AWS Lambda , Linux , Patch Managment

Posted by Roy Horev
Amazon released the EC2 Run Command in 2015 as the first step to extend a bridge back to datacenter, enterprise, and traditional operations ...
Read more

05.23.2019 | vulnerabilities , Pen Testing

Posted by Roy Horev
For an organization to be confident it must have a solid security posture, and for this, regular testing is key. Two types of testing are critical to ...
Read more

05.14.2019 | vulnerabilities

Posted by Roy Horev
In the broadest sense, “Asset Management” means managing the complete life-cycle of every corporate asset, from procurement to safe disposal. ...
Read more

05.7.2019 | vulnerabilities

Posted by Tal Morgenstern
There’s a buzz in the vulnerability market surrounding solutions to protect against Zero Day vulnerabilities - vulnerabilities that were previously ...
Read more
The number of vulnerabilities uncovered daily has long exceeded what security teams can possibly address. The key to success in vulnerability ...
Read more

04.23.2019 | Patching , vulnerabilities

Posted by Tal Morgenstern
With over 1,600 new vulnerabilities reported in the first 100 days of 2019, in addition to the 17,308 reported in 2018, it’s clear that vulnerability ...
Read more

04.4.2019 | vulnerability remediation

Posted by Roy Horev
Vulnerability remediation was once considered a straightforward process. Scanning software identified potential vulnerabilities and notified the ...
Read more
Enterprises face new security threats daily. In 2017-18 alone, over 30,000 new vulnerabilities were reported. Trying to adapt to this new reality has ...
Read more
It’s the question that plagues every CISO: “Have I done enough?” First, you’ve convinced your partners in the boardroom that vulnerabilities are a ...
Read more

03.14.2019 | vulnerabilities , Cybersecurity

Posted by Roy Horev
The number of known vulnerabilities has exploded in recent years. With enterprises using more software solutions, open-source, cloud, Internet of ...
Read more
Everyone knows that CISOs are losing sleep over the dangers that vulnerabilities could potentially cause their businesses, and with good reason. But ...
Read more

02.27.2019 | Patching

Posted by Ortal Keizman
So, it’s time to patch again. Kind of like getting your flu shots – you know it’s good for you, but nobody likes doing it. Let’s do a quick analysis ...
Read more
“If it were easy, everyone would do it.” With the never-ending headlines of major breaches caused by vulnerabilities, it’s clear that vulnerability ...
Read more

02.12.2019 | Cybersecurity

Posted by Roy Horev
No matter what IT field you work in, staying on top of the latest technologies and trends is a must, especially in cybersecurity. Just as a good ...
Read more
Security and IT teams are currently fighting a flood of software vulnerabilities. In 2018 alone, a record 16,555 were reported. Of these, thousands ...
Read more
  It's been over a year since the Equifax breach made headline news. But I have the feeling that organizations haven't looked at the Equifax breach ...
Read more

01.23.2019 | Patching

Posted by Roy Horev
  On the surface, patch management sounds like a straightforward task. But patching in a production environment means making a change to potentially ...
Read more
Posted by Natalie Kriheli
For our day to day product deployment, we use docker containers. Whenever a new piece of code is being shipped to production, our CI/CD process ...
Read more
pAKMEN1

Don’t miss out on the latest

Stay up to date on the latest in Vulnerability Remediation.
We promise not to spam you