Automated Vulnerability Remediation – The Good, the Bad and the Ugly
Jan 07, 2021| 12:00 AM (UTC+00:00),
Clayton Fields & Michael Assraf
On-demand Webinars
By Shani Dodge Reiner & Roi Cohen
Dec 17, 2020
Generating Threat Insights Using Data Science
As the amount of cybercrime and cyber damage grows over time, the need for protecting assets and organizations is paramount.
By Roi Cohen & Gilad Lev
Dec 03, 2020
From Chaos to TOPIA
More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to tackle the growing number of vulnerabilities with the same old tools that can’t keep up with the requirements.
By Clayton Fields & Michael Assraf
Nov 25, 2020
Beyond Subjectivity: Sharpening CVSS with Asset Context
Vulnerability prioritization has traditionally relied on CVSS scores and other subjective measurements (e.g. asset tagging) that don’t factor in internal context. A new approach integrates asset context and application activity to derive rich, internal data.
By Shani Dodge & Roi Cohen
Oct 29, 2020
Determining Vulnerability Exploitation With Real Software Activity
Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.
By Shani Dodge & Roi Cohen
Oct 16, 2020
Prioritize This, Prioritize That, Prioritize With Context!
Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base scores) aren’t doing much to save them, either. A new advancement in threat prioritization offers relief, integrating the vulnerabilities’ surrounding characteristics to identify the most severe risks. This segment is sponsored by Vicarius.
By Santiago Lagóstena García
Oct 14, 2020
The Benefits of Unified Vulnerability Management Program
By Roi Cohen & Advanced Vision IT
Oct 14, 2020
How A Single Vulnerability Can Destroy your Business
1. How a single vulnerability can destroy your business - real breaches under the microscope
2. Why unified vulnerability management platform is a must in the days after COVID-19
3. Discover how Advanced Vision IT Мanaged Services can bring you optimized security and better leverage of existing investments in Cyber Security Technologies
By David Asraf & Roi Cohen
Sep 10, 2020
The Patchless Horseman
Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environment, getting in trouble with users and management for causing an outage, and having to back out a patch, then re-deploy. The team at Vicarius has a way to apply in-memory virtual patches that mitigate exploitation and do not require binaries to be altered. Tune-in for the full description and demo! This segment is sponsored by Vicarius.
By Roi Cohen & Shani Reiner (Dodge)
Aug 27, 2020
Predicting Vulnerabilities In Compiled Code
The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of discovering vulnerabilities in binary code. Research and development of new tools enable security pros to adopt innovative techniques to scale the process.
It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO. This segment is sponsored by Vicarius.
By Roi Cohen & Matt Alderman
Aug 11, 2020
Pentesting Results Paint A Biased Picture - Roi Cohen - BH2020
A live interview with Security Weekly Productions's Paul Asadoorian to kick off Hacker Summer Camp activities!
By Roi Cohen & David Katz
May 18, 2020
How to Protect Your #WFH Workforce and Internal Systems
What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Daniel Vaquero & Roi Cohen
May 04, 2020
Manage Software Vulnerabilities - The Elegant Approach
A system walkthrough in Spanish for Latin countries!
By Roi Cohen
Apr 22, 2020
Maintaining Strong Cyber Hygiene for #WFH Teams
A webinar let by the Israeli Export Institution featuring Vicarius.
By Santiago Lagostena
Apr 08, 2020
Complete Vulnerabilities Life Cycle Management with Vicarius TOPIA
What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Roi Cohen & Todd Schell
Mar 30, 2020
#WFH Biggest Threats
An open discussion about the organization's threats involving continuous vulnerability management.
By Roi Cohen & Ed Amoroso
Mar 30, 2020
Live Inteview with TAG Cyber
A wide discussion with Vicarius Co-Founder, Roi Cohen, with Edward Amoroso, CEO & Founder of TAG Cyber.
By Daniel Vaquero
Mar 23, 2020
Comprehensive Application Protection
What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Daniel Vaquero & Roi Cohen
Mar 23, 2020
How can TOPIA secure #WFH teams?
A system walkthrough in Spanish for Latin countries!