Infosecurity Europe 2018

Most businesses still struggling with mobile working and security
95 percent of surveyed organisations in the UK recognise problems with mobile and remote working, and worryingly, 18% suggest their mobile workers don’t care about security, …

Discover all IT assets across your global hybrid infrastructure
Qualys announced Asset Inventory (AI), a new cloud app with capabilities that provide customers a single source of truth for IT assets spread across hybrid environments …

Cybersecurity: A core component of digital transformation
In this podcast, Kai Grunwitz, Senior VP EMEA at NTT Security, talks about the NTT Security 2018 Risk:Value Report, and the importance of cybersecurity for a successful …

To pay hackers’ ransom demands or to invest in more security?
One third of global business decision makers report that their organization would try to cut costs by paying a ransom demand from a hacker rather than invest in information …

Qualys at Infosecurity Europe 2018: Best practices presentations from industry leaders
There will be no lack of interesting content from Qualys at Infosecurity Europe this year. Depending on you interests, you might want to make time for some of these talks and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility