6 Things To Avoid After a Data Breach

So you’ve just realized that your systems have been breached. The next few steps you take will be vital to the security of your company. There are some actions you need to take immediately. But even more important, there are actions you should avoid by all means necessary. If you’re not sure what we’re talking about, there is no need to go into full panic mode yet. Luckily, we have compiled 6 Things to Avoid After a
- 6 Things To Avoid After a Data Breach

Read more

Meet David, The Anonymous CISO

David is a CISO for a fast-growing startup that allows customers to consolidate all their bank information and investments in one application to easily monitor their financials. Even though David’s customers are happy and feel safe knowing that their sensitive information is secure, David is not. He is responsible for the entire organization’s security, working non-stop to ensure there are no vulnerabilities that could cause a breach in the system, which would be catastrophic for the company. David's
- Meet David, The Anonymous CISO

Read more

Vicarius Named 2020 TAG Cyber Distinguished Vendor

New York, NY – Sept. 24, 2019 – Vicarius, a leading provider of software to protect against exploitation, announces today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual. Vicarius is part of an industry collective supporting democratization of cybersecurity research and advisory materials. Each distinguished vendor is selected by Dr. Edward Amoroso, CEO of TAG Cyber, and agrees to support and promote the free report. “We are happy to have been chosen as part
- Vicarius Named 2020 TAG Cyber Distinguished Vendor

Read more

9.8 CVSS on an App Downloaded 3B+ Times?

In July 2019, a severe vulnerability was found in VLC, an extremely popular media player, used to playback different types of videos on computers and mobile phones. VLC boasts impressive total downloads of over 3 billion, and the vulnerability has a highly critical CVE score of 9.8, making this one of the most dangerous and substantial cyber threats to date. What This Vulnerability Means For Us The memory-corruption flaw is known to reside in the software’s latest release,
- 9.8 CVSS on an App Downloaded 3B+ Times?

Read more

What Is An Attack Surface?

In 2017, there were over 130 large-scale, targeted breaches in the U.S., and the numbers are growing every year by 27%. Professionals are always saying there is no such thing as perfect security, but then why aren’t all cyber vulnerabilities being exploited? It all has to do with what it's worth for the attacker. But to make sure the cost to exploit your organization outweighs the benefits, you need to understand the concept of an “attack surface.” What
- What Is An Attack Surface?

Read more