![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111706/users-400x200.jpg)
Qualys and Bugcrowd bring automation, crowdsourcing to web app security
At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Qualys brings web application security automation to a new level
At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105055/qualys-rsac2017-400x200.jpg)
Qualys at RSA Conference: Implementing innovation
There will be no lack of interesting content from Qualys at this year’s RSA Conference. Depending on you interests, you might want to make time for some of these talks …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Qualys expands cloud-based offering for security consultants
Qualys unveiled two new packages in its Qualys Consultant suite for independent consultants, auditors and security firms. With these new packages, this suite now offers …
![Qualys remediate](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110939/qualys-remediate-400x200.jpg)
Key elements for successfully prioritizing vulnerability remediation
New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Continuous security in the web application space
What we’re seeing in the market right now is increased consolidation among vendors. They’re buying each other, more products covering another vendor’s …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111115/qualys-world-400x200.jpg)
Bringing security into IT and application infrastructures
In this podcast recorded at Black Hat USA 2016, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about a new trend in bringing security into IT …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111131/bhusa2016-expo-16-400x200.jpg)
Photo gallery: Black Hat USA 2016 Business Hall, part 2
A few more photos from the Black Hat USA 2016 Business Hall. Featured companies: NSFOCUS, Qualys, FireEye, Synack, Forcepoint, LogRhythm. Also featured is the US Department of …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111146/bhusa2016-expo-1-400x200.jpg)
Photo gallery: Black Hat USA 2016 Business Hall
Black Hat USA 2016 is underway at Las Vegas, and here are a few photos from the Business Hall. Featured companies: Cisco Talos, Qualys, Armor, IronScales, RiskIQ, Trend Micro.
![jigsaw](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195236/jigsaw-400x200.png)
Oracle splats 276 bugs with mammoth Critical Patch Update
In case you missed it, Oracle’s July 2016 Critical Patch Update is out, and it’s bigger than ever before. It plugs 276 security issues across hundreds of Oracle …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113503/building-400x200.jpg)
Privacy by Design: What it is and where to build it
People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints