![Jim Wojno](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/10092242/jim_wojno_2-qualys-400x200.jpg)
Qualys Context XDR: Bringing context to an organization’s security efforts
Cybersecurity has become more complex than ever, allowing cybercriminals to access organizations through many different routes. To help incident response and threat hunting …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/10124650/infosec_week_11022022-400x200.jpg)
New infosec products of the week: February 11, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Cofense, Cybellum, DataStax, Federal Reserve, Gigamon, Qualys, Runecast, and Spin …
![Qualys Context XDR](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/08161844/qualys_context_xdr-1200-400x200.jpg)
Prioritize threat detection and reduce alert fatigue with Qualys Context XDR
Qualys unveiled Qualys Context XDR. Powered by Qualys Cloud Platform, the solution combines rich asset inventory and vulnerability context, network and endpoint telemetry from …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/03135800/infosec_week_04022022-400x200.jpg)
New infosec products of the week: February 4, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cymulate, Gretel, Juniper Networks, Mandiant, Ping Identity, Qualys, …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Qualys minimizes vulnerability risk for organizations with new remediation feature
Qualys announced it is adding advanced remediation to the Qualys Cloud Platform, enabling organizations to fix asset misconfigurations, patch OS and third-party applications, …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/26100521/infosec_month_october2021-400x200.jpg)
Infosec products of the month: October 2021
Here’s a look at the most interesting products from October, featuring releases from Abnormal Security, Aqua Security, AT&T, Avast, Datto, Data Theorem, Huntress, Jumio, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/07092933/product_week_08102021-400x200.jpg)
New infosec products of the week: October 8, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from Abnormal Security, Pradeo, Qualys, Semperis and Swimlane. Pradeo’s mobile …
Fletch releases two security offerings to help organizations stay ahead of cybercriminals
Fletch launched their first two offerings that continuously analyzes trending threats and insider risk, free of charge. For the past two and half years, Fletch has …
Qualys Ransomware Risk Assessment Service helps organizations to proactively combat ransomware attacks
Qualys released its Ransomware Risk Assessment Service to provide companies with visibility into their ransomware exposure and automate the patching and configuration changes …
![infosec products September](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/29152311/infosec_products-september-400x200.jpg)
Infosec products of the month: September 2021
Here’s a look at the most interesting product releases from September, featuring releases from Attivo Networks, Absolute, Anomali, Alation, Citrix, Cloudflare, Cyware, Code42, …
Nutanix Cloud Platform improves support for mission-critical workloads with AOS 6 software
Nutanix announced new features in the Nutanix Cloud Platform, including the launch of AOS version 6 software, to help enterprises build modern, software-defined data centers …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD