# Vulnerability Management

Blog

Top Nmap Commands for System Admins

Nov 04, 2021

Recent Posts

By Kent Weigle
Nov 03, 2021

How to Use Nmap

 

By Kent Weigle
Nov 03, 2021

What is Nmap?

 

By Kent Weigle
Oct 16, 2021

Three Essential Steps for Vulnerability Remediation

Vulnerability remediation involves the fixing or patching of cybersecurity weaknesses that are detected in applications, networks and enterprise assets. Before, vulnerability remediation was a manual procedure. Nowadays, it’s more automated with advanced threat intelligence, data science and predictive algorithms assisting security professionals to know which vulnerabilities should be remediated first.

By Kent Weigle
Nov 02, 2021

The Hazards of Third-Party Code

 

By Kent Weigle
Oct 25, 2021

Vicarius Achieves SOC 2 Type II Compliance

Daly City, CA – Thursday, October 28, 2021 – Vicarius, Inc. announced today that it has achieved SOC 2 Type II compliance in accordance with American Institute of Certified Public Accountants (AICPA) standards for SOC for Service Organizations also known as SSAE 18. Achieving this standard with an unqualified opinion serves as third-party industry validation that Vicarius, Inc. provides enterprise-level security for customer’s data secured in the Vicarius, Inc. System.

By Kent Weigle
Oct 16, 2021

Challenges of Vulnerability Remediation

It is essential to remember that the end result of vulnerability management is remediation. One of the vital KPIs of a vulnerability management program is how many high-risk vulnerabilities are neutralized or removed before essential assets, confidential data and systems are compromised.

By Kent Weigle
Oct 15, 2021

The Difference Between Remediation and Mitigation

Mitigation and remediation are two words that are used a lot in cybersecurity. Most times they are used interchangeably. Although there is a stark contrast between them, both play a major role in security service providers’ risk-related decisions. In this post, we will take a closer look at both strategies and how threat intelligence contributes to each.

By Kent Weigle
Oct 14, 2021

Vulnerability Remediation Guidelines

Much to our detriment, new software vulnerabilities are discovered on a daily basis. For security professionals and companies alike, this becomes a significant concern. Companies must be able to follow a procedure to guarantee that they do not fall prey to these flaws. 

By Kent Weigle
Oct 08, 2021

What is Vulnerability Remediation?

Vulnerability remediation is the process of discovering IT vulnerabilities and assessing their risks to develop viable countermeasures and remedies. This assessment is a proactive strategy to addressing the vulnerabilities and, if feasible, eliminating the risk.

By Kent Weigle
Aug 12, 2021

Average Time to Remediation Hits 205 Days

According to a report from NTT | Application Security, the average time it takes for vulnerability management teams to remediate cybersecurity vulnerabilities has increased to 205 days. This implies that vulnerability management and patch management don’t receive the support required for effective security hygiene on a systemic level even in the face of the numerous security breaches that have become a mainstay in the global news.

By Kent Weigle
Jul 12, 2021

What is Vulnerability Management?

Vulnerability management is the continual process of assessing, identifying, managing, remediating, and reporting security vulnerabilities across endpoints, systems, and workloads. Generally, vulnerability management tools help the security team detect vulnerabilities and use different processes to remediate or patch them.

By Kent Weigle
Jul 28, 2021

Vicarius Records Signs Underground Sensation Lil CISO

Vicarius today announced the signing of Lil CISO to Vicarius Records, adding yet another promising talent to their multimedia portfolio. 

By Kent Weigle
Jul 12, 2021

Benefits of Scanless Vulnerability Assessment

The use of scanless assessment to recognize vulnerabilities has numerous benefits, including minimizing network interruption. 

By Kent Weigle
Jul 12, 2021

Three Important Steps for Your Vulnerability Remediation Process

Over 5,000 vulnerabilities make their way to headlines every year. The number will continue to grow, considering that the publicly disclosed vulnerabilities encourage the hackers in their devious acts.

By Kent Weigle
Jul 10, 2021

Challenges with Traditional Vulnerability Scanners

In today's world, data breaches and cyberattacks are very common. There are many news reports of the latest cyber incident nearly every week. You can understand why cybersecurity is an increasing concern for businesses with lots of data breaches happening all around the world.

    CVE Invaders
    cta_cve_06_28px.gif