cover

Vicarius Raises $5M to Protect Apps & Assets Against Vulnerabilities

Today, the Vicarius team is proud to announce the close of our $5M funding round led by JVP (Jerusalem Ventures Partners), with the participation of Innogy Ventures and Goldbell Investments. This seed investment gives our team the capital injection needed to continue the design and development of many great Vicarius products like TOPIA.

In: #wolves

We Are Vicarius

In today’s world of technological innovation, the cybersecurity industry is still failing to properly secure organizations against exploitation, which makes software exploitation a growing epidemic:

To Patch, Or Not To Patch? -- That Is The Question!

So you’re at that warm, fuzzy place CISOs and IT professionals know all-too-well: There are countless vulnerabilities your organization is “theoretically” vulnerable to, for which you’d like to start implementing patches immediately to increase security, but on the other hand, you’re concerned about patches and new version releases breaking users’ functionality.

In: #patching

How To Secure Your Computer for #ComputerSecurityDay?

Vicarius’ TOPIA is the best-in-class enterprise software to prioritize, reduce and act against cyber risks and vulnerabilities. However, it’s main use is with corporate organizations and large-scale networks. For everyone else and for #ComputerSecurityDay, we came up with simple and easy actions you can take to reduce risk immediately, mitigate vulnerabilities, and protect your privacy and anonymity online.

In: #protect

Greatest Healthcare Data Breaches of 2019

Unfortunately, 2019 has been a big year for hackers. From January, cyberattacks have been impacting a countless number of individuals, especially within the Healthcare industry. With it being a big target, we have gathered some of the Greatest Healthcare Data Breaches of 2019.

In: #protect

The Linux 'sudo' Flaw is the Real Deal

In October of 2019, a flaw was found in sudo, a core command utility that is an integral part of all Linux distributions. This vulnerability allows Linux users to gain access as a root (admin) user and run commands that would otherwise be restricted to them. With a low level of difficulty for exploitation and a CVSS score of 7.8, this sudo flaw is the real deal.

In: #patching

6 Things To Avoid After a Data Breach

So you’ve just realized that your systems have been breached. The next few steps you take will be vital to the security of your company. There are some actions you need to take immediately. But even more important, there are actions you should avoid by all means necessary. If you’re not sure what we’re talking about, there is no need to go into full panic mode yet. Luckily, we have compiled 6 Things to Avoid After a Data Breach.

In: #abuse

Meet David, The Anonymous CISO

David is a CISO for a fast-growing startup that allows customers to consolidate all their bank information and investments in one application to easily monitor their financials.

In: #security

Leave a Reply

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀