home.aspx


 
.

Vicarius


Vicarius protects clients against exploitation of yet-to-be-discovered software vulnerabilities. The Vicarius powered platform, called Topia, enables companies to predict, prioritize and protect against software vulnerabilities before they can be exploited by hackers. Vicarius begins by identifying vulnerabilities within clients' digital environment using a proprietary binary code analysis methodology. It then prioritizes these vulnerabilities, building a live threat map of the organization's infrastructure, using asset context analysis. Lastly, a shim layer is deployed to protect software from identified vulnerabilities by limiting access to its exploitable code in real-time. Topia is live and already protecting dozens of organizations worldwide.

RELATED NEWS


The first indication that something was amiss came at 9 a.m. on Saturday, January 25, 2003. Workers at the Davis-Besse nuclear power plant, in Ohio, noticed a slowdown in applications on the corporate WAN. Little did they know a worm called SQL Slammer was hammering the network. And things were about to get worse. By 4 p.m. the malware had gotten into the systems used to control the reactor. The Safety Parameter Display System, which tells operators about the state of the plant, blinked off at 4...
CISCO
READ MORE

The holidays are a slow time for news, leading much of the media to focus on stuff like sports and Mariah Carey's meltdown on New Year's Eve. But the end of 2016 also brought a spate of stories involving hacking, which has become one of the biggest political and security issues of our time.So in case you've been away or offline, here's a summary of five significant cybersecurity stories that came out while you were quaffing eggnog or watching football:...
FORTUNE.COM
READ MORE

New Android malware that stealthily mines the Monero cryptocurrency is posing as a legitimate Google Play update app (complete with Google Play’s icon), so far affecting users in India and China where third-party app stores are more popular. According to Trend Micro researchers, the malware is being used in a notably successful and active campaign; in one case, operators withdrew over $5,000 worth of Monero from one wallet. Dubbed HiddenMiner, it lives up to its name by using various obfus...
INFOSECURITY-MAGAZINE
READ MORE

As lawmakers and federal investigators continue to try to understand the chaos foreign actors were able to create during the 2016 election, the US Department of Homeland Security has taken a central role in helping secure the next election. The agency declared the US election system, which is run by a fragmented group of officials in all 50 states as well as dozens of smaller local governments, to be a part of the nation's "critical infrastructure" in January 2017. The agency doesn...
CNET
READ MORE

Cisco’s Talos intelligence and research group announced on Monday the availability of a new open source framework designed for automatically generating antivirus signatures from malware. The tool, named BASS, has been described as an automated signature synthesizer. The framework creates signatures from malware belonging to previously generated clusters and its main goals are to improve resource usage and make malware analysis easier....
SECURITY WEEK
READ MORE

NEW YORK, November 14, 2016 – Spurred by the growing and often contradictory cybersecurity regulatory burden facing companies, Thomson Reuters, Pillsbury and FireEye have formed an industry- first collaboration to help corporations meet new regulations and manage risk related to cybersecurity. This alliance affords institutions expertise and resources from a holistic, multi-pronged approach to cybersecurity risk assessment and due diligence that combines legal counsel, technical assessment...
FIREEYE, INC.
READ MORE

EVENTS

No Upcoming Events For Vicarius
No Past Events For Vicarius