Expert analysis
How to gain visibility with global IT asset inventory
In this podcast recorded at Black Hat USA 2018, Pablo Quiroga, Director of Product Management at Qualys, talks about how to gain unprecedented visibility with global IT asset …
Data privacy automation: Unlock your most valuable asset
In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the …
Hackers wage a new Cold War
The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the …
A case for more accessible cybersecurity
If you’re a part of the infosec community, you’re likely all too familiar with the frantic calls, text messages and emails we receive from our friends and family …
APIs: The Trojan horses of security
At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint …
September Patch Tuesday forecast: Evaluate third-party updates alongside Microsoft release
There’s some good and some bad news for the Patch Tuesday forecast this month. The good news is a number of vendors have just released last week, clearing the slate for what …
A closer look at the IT/OT landscape for infosec professionals
The challenge for modern cyber security engineers working in the OT/ICS area involves modernizing the weak or missing protection controls in existing infrastructure toward …
Back to school: Lessons in endpoint security
It’s back to school season, and students, teachers and administrators are returning to campuses and classrooms. All of those students and staffers are working on desktops and …
How metrics can enhance the effectiveness of security programs
For anyone responsible for maintaining their organization’s security posture, the findings from the SANS 2018 Security Operations Center (SOC) Survey should come as no …
Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps
In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys …
Implications of the California Consumer Privacy Act of 2018
It’s no secret, consumers are increasingly mindful of who is accessing, collecting, receiving, storing and otherwise processing their personal data. In an effort to …
Ransomware is a big problem, but it’s also a big opportunity for MSPs to educate clients
While large-scale attacks such as WannaCry make headlines, ransomware attacks are just as likely to happen among small businesses as they are large enterprises. According to …