Understanding the top 20 Critical Security Controls
In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about the 20 Critical Security Controls, which outline a practical approach to …
Is your browser a user agent, or a double agent?
In this podcast recorded at RSA Conference 2014, Mike Shema, Director of Engineering at Qualys, discusses how privacy shouldn’t be an afterthought in the browser. Data …
The security of embedded devices
Embedded devices are everywhere and they make our lives more convenient, but from a security standpoint, they can be intimidating, especially if we’re talking about an …
Video: RSA Conference 2014 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2014. Here’s a closer look at the show, watch …
A walk through the RSA Conference 2014 expo, part 4
For up-to-date conference news check out our dedicated coverage page for RSA Conference 2014. Featured firms: Qualys, Sophos, NetIQ, Egnyte, DB Networks.
Free tool helps fend off most cyber attacks
Today at the RSA Conference Qualys announced that it has collaborated with the SANS Institute and the Council on CyberSecurity to release a new free tool to help organizations …
The look and feel of RSA Conference 2014
RSA Conference 2014 is underway at the Moscone Center in San Francisco, and infosec companies, experts and potential customers are crowding the expo floor. Here’s the …
Qualys introduces Continuous Monitoring cloud service
Qualys introduced Continuous Monitoring, the most recent addition to its QualysGuard Cloud Platform, at the RSA Conference in San Francisco. This new offering gives …
Qualys releases Web Application Firewall
Today at the RSA Conference, Qualys announced the availability of its QualysGuard Web Application Firewall (WAF) service for web applications running in Amazon EC2 and …
Qualys CEO to deliver keynote at RSA Conference 2014
Qualys chairman and CEO Philippe Courtot will deliver a keynote speech at the upcoming RSA Conference 2014 on Thursday, February 27 at 3:30 p.m. PT. Security professionals in …
Lessons learned in password security 2013
As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …
Configuring for security in a world of 0-days
Last month, Microsoft published two separate notices of 0-day vulnerabilities that were being used in the wild to attack Microsoft products. The first flaw is in a code …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility