Automated Vulnerability Remediation – The Good, the Bad and the Ugly

Jan 07, 2021|
12:00 AM (UTC+00:00),
Clayton Fields & Michael Assraf

On-demand Webinars

By Shani Dodge Reiner & Roi Cohen
Dec 17, 2020

Generating Threat Insights Using Data Science

As the amount of cybercrime and cyber damage grows over time, the need for protecting assets and organizations is paramount.
By Roi Cohen & Gilad Lev
Dec 03, 2020

From Chaos to TOPIA

More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to tackle the growing number of vulnerabilities with the same old tools that can’t keep up with the requirements.
By Clayton Fields & Michael Assraf
Nov 25, 2020

Beyond Subjectivity: Sharpening CVSS with Asset Context

Vulnerability prioritization has traditionally relied on CVSS scores and other subjective measurements (e.g. asset tagging) that don’t factor in internal context. A new approach integrates asset context and application activity to derive rich, internal data.
By Shani Dodge & Roi Cohen
Oct 29, 2020

Determining Vulnerability Exploitation With Real Software Activity

Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture.
By Shani Dodge & Roi Cohen
Oct 16, 2020

Prioritize This, Prioritize That, Prioritize With Context!

Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base scores) aren’t doing much to save them, either. A new advancement in threat prioritization offers relief, integrating the vulnerabilities’ surrounding characteristics to identify the most severe risks. This segment is sponsored by Vicarius.
By Santiago Lagóstena García
Oct 14, 2020

The Benefits of Unified Vulnerability Management Program

By Roi Cohen & Advanced Vision IT
Oct 14, 2020

How A Single Vulnerability Can Destroy your Business

1. How a single vulnerability can destroy your business - real breaches under the microscope 2. Why unified vulnerability management platform is a must in the days after COVID-19 3. Discover how Advanced Vision IT Мanaged Services can bring you optimized security and better leverage of existing investments in Cyber Security Technologies
By David Asraf & Roi Cohen
Sep 10, 2020

The Patchless Horseman

Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environment, getting in trouble with users and management for causing an outage, and having to back out a patch, then re-deploy. The team at Vicarius has a way to apply in-memory virtual patches that mitigate exploitation and do not require binaries to be altered. Tune-in for the full description and demo! This segment is sponsored by Vicarius.
By Roi Cohen & Shani Reiner (Dodge)
Aug 27, 2020

Predicting Vulnerabilities In Compiled Code

The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of discovering vulnerabilities in binary code. Research and development of new tools enable security pros to adopt innovative techniques to scale the process.
By Michael Assraf & Paul Asadoorian
Aug 14, 2020

Vulnerability Rich - Contextually Blind! - Michael Assraf - PSW #662

It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO. This segment is sponsored by Vicarius.
By Roi Cohen & Matt Alderman
Aug 11, 2020

Pentesting Results Paint A Biased Picture - Roi Cohen - BH2020

A live interview with Security Weekly Productions's Paul Asadoorian to kick off Hacker Summer Camp activities!
By Roi Cohen & David Katz
May 18, 2020

How to Protect Your #WFH Workforce and Internal Systems

What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Daniel Vaquero & Roi Cohen
May 04, 2020

Manage Software Vulnerabilities - The Elegant Approach

A system walkthrough in Spanish for Latin countries!
By Roi Cohen
Apr 22, 2020

Maintaining Strong Cyber Hygiene for #WFH Teams

A webinar let by the Israeli Export Institution featuring Vicarius.
By Santiago Lagostena
Apr 08, 2020

Complete Vulnerabilities Life Cycle Management with Vicarius TOPIA

What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Roi Cohen & Todd Schell
Mar 30, 2020

#WFH Biggest Threats

An open discussion about the organization's threats involving continuous vulnerability management.
By Roi Cohen & Ed Amoroso
Mar 30, 2020

Live Inteview with TAG Cyber

A wide discussion with Vicarius Co-Founder, Roi Cohen, with Edward Amoroso, CEO & Founder of TAG Cyber.
By Daniel Vaquero
Mar 23, 2020

Comprehensive Application Protection

What is Vicarius and how can it help to secure organizations? Don't miss this webinar!
By Daniel Vaquero & Roi Cohen
Mar 23, 2020

How can TOPIA secure #WFH teams?

A system walkthrough in Spanish for Latin countries!
    CVE Invaders