Please turn on your JavaScript for this page to function normally.
network
The evolution of cybersecurity within network architecture

The vulnerable state of the world during the pandemic paved way for an aggressive onslaught of attacks, with around 39 percent of businesses experiencing a cybersecurity …

code
Keeping pace with evolving code signing baseline requirements

Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …

patch
June 2021 Patch Tuesday forecast: Patch management is back in the spotlight

Every day you look in the security news, there are reports of new ransomware attacks. Just after May Patch Tuesday we heard about the Colonial Pipeline attack, and this week …

servers
Quantum computing: How should cybersecurity teams prepare for it?

The late Field-Marshall Archibald Wavell wrote of the Malayan Campaign, “The story (…) is typical of the British way of war, and therefore begins with a complete lack of …

privacy
Changes in the privacy landscape through the pandemic

The pandemic has turned the way businesses operate upside down. In the rush to keep the lights on, businesses pivoted online to keep sales up and maintain customer services. …

lock
Reimagining enterprise cryptography: How to regain control in a fragmented environment

Cryptography has been on a significant journey over the past two decades. Its role in securing the digital world of 20 years ago was very different to its role in the modern …

shield
Making transparency a norm in cybersecurity

The general lack of transparency around cybersecurity continues to be one of the largest factors holding back the combined ability of the public and private sector to truly …

Good
The power of positive reinforcement in combating cybercriminals

Funnily enough, humans aren’t too different from dogs when it comes to changing a behavior for the better. One of the most powerful leadership tools is positive …

target
The most important point in a cyberattack is before it happens

Let’s get the scary thing out of the way: more than half of businesses have dealt with a serious security breach in the last two years. The chances of one happening are so …

Adapting the network for a remote working future

In the wake of the 2008 financial crisis, there was a big emphasis on stress testing major banks to determine if they have the reserves and processes to withstand such an …

network
Cybersecurity industry analysis: Another recurring vulnerability we must correct

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, …

Qualys CSAM
Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Unlike traditional inventory tools that focus solely on visibility or rely on third-party solutions to collect security data, Qualys CyberSecurity Asset Management (CSAM) is …

Don't miss

Cybersecurity news