Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Vulcan Cyber

Vulcan Cyber has developed the industry's first vulnerability remediation platform, built to help cybersecurity and IT operations teams collaboratively secure digital business. The Vulcan SaaS platform closes the gap between detection and remediation to reduce vulnerability dwell time and associated business risk. Vulcan Cyber orchestrates the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. It's unique ability to "get fix done" has garnered Vulcan Cyber recognition as a 2019 Gartner Cool Vendor and an RSAC Innovation Sandbox 2020 finalist. Based in Tel Aviv and San Francisco, Vulcan Cyber is privately funded by cybersecurity specialists YL Ventures and TenEleven Ventures.

Our Website:

Latest Content From Vulcan Cyber

Whitepaper: Cloud Security Blind Spots (and how to avoid them)

by Vulcan CyberApr 11, 2022

Cloud adoption continues to accelerate. More and more organizations are recognizing the business value and efficiencies of running compute workloads and data storage needs to the cloud. But cloud computing requires cloud security to effectively measure, manage and mitigate risk and lock down new attack surfaces. This white paper explores the top cloud security blind spots that threaten organizations migrating to the cloud, and suggests the best practices, processes and tools to assist teams in getting the most out of cloud, securely.

Here's what you'll learn

  • Who is responsible for cloud security?
  • The 5 biggest cloud security traps
  • How to avoid cloud security blind spots
  • How to use tools and automation to reduce cloud security blind spots

Whitepaper: The Top 5 Mistakes Everyone Makes in Vulnerability Management

by Vulcan CyberJan 11, 2022

Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. But moving from vulnerability management to cyber risk management isn't easy. There are so many moving parts, with dozens of stakeholders, and infrastructure and attack surfaces that are growing exponentially to meet the demands of the business. This white paper provides a summary of the top mistakes in vulnerability management initiatives that if addressed correctly, can improve cyber security posture significantly.

Infographic: Most Risk-Based Vulnerability Management Programs are Ineffective

by Vulcan CyberJan 11, 2022

Eighty-six percent of enterprise IT and security executives surveyed rely on third-party vulnerability severity data to prioritize vulnerabilities with an additional 70% relying on third-party threat intelligence. This underscores a concerning trend identified in a majority of cyber security organizations today, with a majority relying heavily on measures and data from external sources that lack the necessary context to effectively inform and prioritize cyber risk specific to their business unit or enterprise service. Get the full survey and infographic here.

Whitepaper: The Best Free and Open Source Tools for Cyber Risk Assessment and Mitigation

by Vulcan CyberJan 11, 2022

The number of newly disclosed vulnerabilities has been growing for more than a decade and the emergence of cloud-native infrastructure has only escalated the pace. With so many new vulnerabilities to fix, dozens of free and open-source tools are available to help assess and mitigate cyber risk. This white paper outlines the most-useful free and open-source tools to help IT security teams get started with effective cyber risk measurement, management and mitigation.

E-Book: A Step-by-Step Guide to Achieve Vulnerability Management Maturity

by Vulcan CyberJan 11, 2022

Read the eBook to understand the four stages of vulnerability remediation maturity: Reactive; Data-driven; Orchestrated; Transformative. Learn the behaviors and benefits of each stage starting with risk-based vulnerability aggregation and prioritization. Then discover how your organization can move from "Reactive" to "Transformative" with the Vulcan Cyber vulnerability remediation maturity model eBook and more effectively mitigate cyber risk and protect your business from security threats.

E-Book: Four Benchmarks for Vulnerability Management Maturity

by Vulcan CyberMar 08, 2021

Scanning vulnerabilities won't protect your digital infrastructure from exploit. Digital business needs end-to-end vulnerability remediation delivered by mature vulnerability management programs.

Get "The Vulnerability Remediation Maturity Model" eBook and learn:

  • The four stages of vulnerability remediation maturity.
  • If your peers' perception of vulnerability remediation maturity attainment aligns with the reality.
  • How to improve your vulnerability management program from any stage of maturity.
  • How to move from reactive, inefficient vulnerability management to proactive, agile vulnerability remediation that scales.

Whitepaper: Secure the Data Lake with Vulnerability Remediation Orchestration

by Vulcan CyberFeb 26, 2021

Securing a data lake seems impossible, and data-driven vulnerability remediation seems next level, but Snowflake is doing it today using Vulcan Cyber remediation orchestration.

Read this Vulcan Cyber case study and learn how Snowflake gets fix done:

  • How to secure data at enterprise a service.
  • How to let the data drive a vulnerability remediation program.
  • Why a universal vulnerability remediation translator is needed to keep security and IT teams on the same page.
  • Why Vulcan was selected to help Snowflake move from vulnerability management to vulnerability remediation.

Whitepaper: From Scan to Fix, the Best Free Vulnerability Management Tools

by Vulcan CyberFeb 26, 2021

With so many new vulnerabilities to manage and fix, and an almost equally large number of vulnerability management tools available to security and IT operations teams, important, actionable remediation intelligence often gets lost in the fray.

Read this whitepaper to learn:

  • Which free, open source tools can provide value to your vulnerability management program?
  • When open source tools can effectively replace expensive, commercial alternatives.
  • How to identify the right database for vulnerability intelligence.

Whitepaper: A Business Case for Vulnerability Remediation Orchestration

by Vulcan CyberFeb 26, 2021

From the moment the team scans for vulnerabilities, the rest of the remediation effort becomes tedious and uncertain with no guarantee fix will get done. The growing scale of digital infrastructure and the complexity of IT security programs has resulted in unacceptable inefficiencies. Companies now spend an average of nearly 500 hours a week on vulnerability management with no guarantee of remediation. This white paper provide the details, the math and examples to help you build a business case for vulnerability remediation orchestration. It is time to get fix done.

Read "A Business Case for Vulnerability Remediation Orchestration" to learn:

  • How to calculate the effectiveness and ROI of legacy vulnerability management programs.
  • Why vulnerability management isn't enough, and is leaving your business exposed.
  • How to build an internal business case for vulnerability remediation orchestration.

Whitepaper: The Missing Pieces You Need to Automate Vulnerability Remediation

by Vulcan CyberAug 13, 2020

Vulnerability remediation at scale isn't possible without cross-functional team collaboration and shared automation. Are your existing people and tools being used to their fullest extent to efficiently protect your critical business operations?

Download "Automating Your Vulnerability Remediation Process" and get these elusive, missing pieces:

  • Free resources for vulnerability risk and exploit identification.
  • Vulnerability remedies and solutions relevant to your unique infrastructure.
  • Time-saving code snippets and scripts for automating vulnerability remediation.