Date | Title | Description |
02.05.2025 | The Future of Customer Experience: Navigating the AI Landscape | In the fast-paced world of customer service, the landscape is shifting. The rise of artificial intelligence (AI) is reshaping how businesses interact with their customers. As companies strive to meet the evolving expectations of consumers, ... |
29.04.2025 | GreyNoise Intelligence Selected by Cyber Defense Magazine's Global Infosec Awards 2025 as Best Deception-Based Security and Vulnerability Intelligence Solution | GreyNoise has been selected as the winner of Cyber Defense Magazine’s Global Infosec Awards 2025 for its newest solution, GreyNoise for Vulnerability Prioritization.
Demonstrates Strong Business Momentum, Adds World-Class Talent to its Lead... |
26.04.2025 | Navigating the Compliance and Security Maze: The New Tools for Modern Enterprises | In today’s digital landscape, compliance and security are like a double-edged sword. Enterprises face a barrage of regulations. The stakes are high. Missteps can lead to penalties that feel like a financial guillotine. The pressure is mount... |
24.04.2025 | New Qualys tool aims to streamline enterprise compliance audits | Enterprises are grappling with an increasing compliance burden, subject to multiple frameworks and more regulatory mandates that stretch resources and drive-up costs.
Misconfigurations can further complicate things, often leading to non-com... |
06.04.2025 | Opsera: $20 Million (Series B) Secured For AI-Based DevOps Platform Innovation | Opsera, an AI-based DevOps platform trusted by many companies, announced it has raised $20 million in Series B funding, led by Prosperity7 with participation from Hitachi Ventures. This funding round represents a breakout year with several ... |
03.04.2025 | Opsera's $20 Million Funding: A Leap into AI-Driven DevOps Revolution | In the fast-paced world of software development, speed and efficiency are the golden keys. Opsera, a rising star in the DevOps arena, has just secured $20 million in Series B funding. This significant investment is not just a financial boos... |
02.04.2025 | Opsera Raises $20 Million to Drive AI-Powered DevOps Platform Innovation, Accelerating AI Agent Adoption and Developer Efficiency | Opsera reports 200% revenue growth since raising Series A+ and expands Unified Insights with AI code assistant integrations to improve developer experience.
Opsera, the AI-Powered DevOps platform trusted by top Fortune 1000 companies, today... |
02.04.2025 | Opsera Raises $20M to Drive AI-Powered DevOps Platform Innovation, Accelerating AI Agent Adoption and Developer Efficiency | Opsera reports 200% revenue growth since raising Series A+ and expands Unified Insights with AI code assistant integrations to improve developer experience.
SAN FRANCISCO, April 2, 2025 /PRNewswire/ -- Opsera, the AI-Powered DevOps platform... |
31.03.2025 | The Cybersecurity Frontier: Cowbell Connectors Leads the Charge | In the digital age, cybersecurity is the fortress protecting businesses from unseen threats. As cyber attacks surge, companies must fortify their defenses. Cowbell, a key player in the cyber insurance landscape, is stepping up. Their latest... |
28.03.2025 | Insurtech : Cowbell Connectors Expands to 30+ Integrations, Enhancing “Inside-Out” Cybersecurity | Cowbell, a provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses, has expanded its Cowbell Connectors to over 30 integrations with security and cloud service providers.
While many businesses ... |
24.03.2025 | Rethinking risk -- are you taking the right path around security? | In the film Sliding Doors, a split second choice leads to two branching stories -- yet while the two stories are very different, they both lead to hospital trips and potential tragedy. The world of cyber security is similar. Whatever decisi... |
04.02.2025 | Qualys unveils AI-powered app risk management solution | - |
30.01.2025 | The Rising Tide of Cybersecurity: A Surge in Antivirus Sales Amid Growing Threats | In 2024, the world of cybersecurity witnessed a significant shift. Antivirus software sales in Russia surged by 41% compared to the previous year. This surge is not just a statistic; it reflects a growing awareness of digital threats and th... |
29.01.2025 | О механизмах безопасности OpenSSH: разбираем уязвимости 2024 года | Прошлый год интересно проходил для SSH. Весной — бэкдор в xz-utils (CVE-2024-3094), в результате эксплуатации которого были скомпрометированы системы с systemd, в которых в OpenSSH есть зависимость liblzma, отсутствующая в нем изначально и ... |
22.01.2025 | The Rise of Murdoc_Botnet: A New Threat in Cybersecurity | In the ever-evolving landscape of cybersecurity, new threats emerge like shadows in the night. The latest specter haunting the digital realm is the Murdoc_Botnet, a variant of the notorious Mirai botnet. Discovered by researchers at Qualys ... |
21.01.2025 | New Mirai variant ‘Murdoc_Botnet’ targets AVTECH cameras and Huawei routers
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provi... | Researchers at cybersecurity software provider Qualys Inc. are warning of a new Mirai botnet variant that’s being used to target vulnerabilities in AVTECH Cameras and Huawei HG523 routers.
The variant, dubbed “Murdoc_Botnet,” was first dete... |
09.01.2025 | The Rise of OpenAI: A Leap Toward AGI and the Cybersecurity Landscape | In December 2024, OpenAI unveiled a series of groundbreaking advancements during its “12 Days of OpenAI” event. Among these innovations was the introduction of the o3 and o3-mini models, which are touted as surpassing human capabilities in ... |
08.01.2025 | 5 способов получить RCE на практике | Для специалистов в области offensive security обнаружение уязвимостей удалённого выполнения кода (RCE) является настоящей жемчужиной как для black-box проектов, так и для white-box. Такие уязвимости могут проявляться по-разному, но также су... |
07.01.2025 | CompTIA CS0-003 Practice Test Dumps: Your Comprehensive Guide to Passing the CompTIA CySA+ Exam | Share
Tweet
Share
Share
Email
In an increasingly interconnected world, cybersecurity is more important than ever. As cyberattacks continue to evolve in sophistication and frequency, organizations need skilled professionals who can defend ag... |
18.12.2024 | More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025 | Artificial intelligence has been one of the fastest growing areas in the tech sector over the past few years.
As AI becomes more commonly adopted what changes can we expect to see happening in 2025? Here are some expert views.
Avthar Sewrat... |
14.12.2024 | Linux LPE через Needrestart (CVE-2024-48990) | Введение
19 ноября 2024 года компания Qualys публично раскрыла информацию о пяти уязвимостях в утилите Needrestart. Эти уязвимости касаются локальной эскалации привилегий(LPE) и были найдены в бинарном файле. CVE-2024-48990 затрагивает верс... |
13.12.2024 | В тренде VM: под прицелом продукты Windows, Ubuntu Server, Zyxel и другие | Хабр, привет! Я Александр Леонов, ведущий эксперт PT Expert Security Center. Мы с командой аналитиков Positive Technologies каждый месяц исследуем информацию об уязвимостях, полученную из баз и бюллетеней безопасности вендоров, социальных с... |
03.12.2024 | Zabbix предупредила о критической уязвимости CVE-2024-42327 в своём решении с открытым исходным кодом для мониторинга | Компания Zabbix предупредила о критической уязвимости высокой степени опасности в своём решении с открытым исходным кодом для мониторинга корпоративных сетей, которая может позволить злоумышленникам внедрять произвольные SQL-запросы и скомп... |
26.11.2024 | The Need for Cyber Awareness: Kaspersky's Initiative and the Needrestart Vulnerability | In a world where technology is as common as the air we breathe, the importance of cybersecurity cannot be overstated. Recent developments highlight two critical aspects of this domain: the vulnerabilities in software that can lead to catast... |
25.11.2024 | ТОП-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — уязвимости в утилите needrestart для Ubuntu, новый скрытый загрузчик BabbleLoader, атака на брандмауэров Palo Alto Networks, вредоносное ПО Infostealer в пакетах PyPI и 0-day уязвимости в VINTEO, найденные Positive Technol... |
25.11.2024 | Security Week 2448: десятилетняя уязвимость в утилите needrestart | На прошлой неделе специалисты компании Qualys сообщили об обнаружении достаточно серьезной уязвимости в утилите needrestart. Данная утилита используется, в частности, в ОС Ubuntu Server начиная с версии 21.04 и запускается после установки и... |
19.11.2024 | The graph database arms race: How Microsoft and rivals are revolutionizing cybersecurity | Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Multidomain attacks are on the verge of becoming a digital epidemic as nation-states and well-funded cybercrime a... |
08.11.2024 | Top Vulnerability Management Tools: Reviews & Comparisons 2024 | Best overall: Tenable Vulnerability ManagementBest for SMEs: ESET Vulnerability and Patch ManagementBest for patch management: Syxsense EnterpriseBest cybersecurity suite incorporating vulnerability management: CrowdStrike Exposure Manageme... |
04.11.2024 | Cybersecurity: The New Frontier of Risk Management | In the digital age, cybersecurity is not just a technical issue; it’s a matter of survival. As businesses and governments embrace digital transformation, they find themselves navigating a treacherous landscape filled with cyber threats. The... |
04.11.2024 | Qualys Cloud Platform achieves IRAP PROTECTED status | Qualys has announced that its Qualys Cloud Platform has been successfully evaluated at the 'PROTECTED' level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD).
This IRAP assessment... |
04.11.2024 | Navigating the evolving landscape of cyber risk management | Cyber risk management has become a critical focus for businesses and government entities in today's rapidly digitising world. As organisations embrace digital transformation, they must navigate complex cyber threats and leverage key technol... |
29.10.2024 | Report: Mitigating the Vulnerability Exploit Surge | One of the most common means cyber-attackers bypass IT security is through their reliance on vulnerabilities (known flaws) to gain access to and potentially manipulate computer systems.
Recently surging vulnerability exploitation has left o... |
18.10.2024 | Cyberrisk quantification and how to measure it [Q&A] | Enterprises face an increasing range of cybersecurity risk, but quantifying and managing those risks can be a difficult task.
Recent Gartner research shows that more companies are trying to roll out cyber risk quantification (CRQ) in order ... |
11.10.2024 | The Cloud Security Quagmire: Navigating the Toxic Triad and Emerging Solutions | In the digital age, clouds can be both a sanctuary and a storm. Organizations are increasingly migrating to the cloud, lured by promises of flexibility and scalability. Yet, lurking within these virtual skies is a tempest known as the "... |
10.10.2024 | Qualys launches cloud-based risk operations center | Organizations are facing an ever-growing volume of risk alerts spread across multiple, disconnected top-10 dashboards. This fragmented view can result in conflicting analyses, duplicate work, missed threats, and strategies that fail to full... |
30.08.2024 | CyberArk and the Battle for Cloud Security: A New Era of Vigilance | In the digital age, security is paramount. CyberArk, a leader in identity security, recently achieved the Trusted Cloud Provider trustmark from the Cloud Security Alliance (CSA). This accolade is not just a badge; it’s a beacon. It signals ... |
30.08.2024 | Бэкдоры OpenSSH | Представьте себе: обнаружен бэкдор в OpenSSH, мейнтейнеры спешат выпустить релиз с исправлениями, исследователи безопасности обмениваются техническими деталями, чтобы проанализировать вредоносный код. Разгораются обсуждения по поводу причас... |
26.08.2024 | Top firms stress vigilance during National Scam Awareness Week | National Scam Awareness Week is gaining momentum, with leaders in the cybersecurity industry highlighting the urgent need for heightened vigilance and robust security measures.
Executives from prominent security firms Qualys, SailPoint, and... |
15.08.2024 | Black Hat USA 2024 Closes on Record-Breaking Event in Las Vegas | Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2024. The event welcomed more than 21,700 unique at... |
07.08.2024 | The Rising Tide of Cyber Vulnerabilities: A Call to Action | In the digital age, the landscape of cybersecurity resembles a vast ocean. Each wave brings new challenges, and the tide is rising. Recent reports reveal a staggering 30% increase in reported vulnerabilities, reaching a total of 22,254. Thi... |
07.08.2024 | Cybersecurity report shows 30% rise in vulnerabilities | According to the Qualys 2024 Midyear Threat Landscape Review, the number of reported Common Vulnerabilities and Exposures (CVEs) has risen by 30% in the last year, reaching a total of 22,254.
This increase underscores the growing complexity... |
06.08.2024 | Navigating the New Frontier: The Rise of AI Security and Strategic Leadership in Tech | In the fast-paced world of technology, change is the only constant. Companies are racing to adopt new innovations, especially in artificial intelligence (AI) and large language models (LLMs). But with great power comes great responsibility.... |
06.08.2024 | Qualys launches TotalAI to tackle LLM cybersecurity risks | Qualys has announced the release of Qualys TotalAI, a new solution aimed at addressing the critical risks associated with large language model (LLM) applications, including prompt injection, sensitive information disclosure, and model theft... |
05.08.2024 | Qualys Boosts TruRisk Platform to Manage AI and LLM Security and Compliance Risks | New solution, Qualys TotalAI, enables holistic discovery and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft
Qualys, a leading provider of disruptive cloud-based IT, security and compliance so... |
02.08.2024 | Топ самых интересных CVE за июль 2024 года | ⚠ Внимание ⚠
Вся информация, представленная ниже, предназначена только для ознакомительных целей. Автор не несет ответственности за вред, который может быть причинен с помощью предоставленной им информации.
В этой подборке представлены самы... |
26.07.2024 | The Windows 10 to Windows 7 Transformation: A Risky Experiment**
** | ** In the world of technology, nostalgia often drives innovation. Windows 7, once a titan of operating systems, still holds a special place in many users' hearts. Fast forward to 2024, and Windows 10 and 11 dominate the landscape. Yet, a cu... |
25.07.2024 | Dazz and Coast: The New Titans of Tech Funding**
** | ** In the fast-paced world of technology, two startups have recently captured the spotlight with significant funding rounds. Dazz, a unified security remediation platform, raised $50 million, while Coast, a fleet management solution, secure... |
25.07.2024 | The Rise of Farm Robotics: Navigating Challenges and Opportunities in 2024**
** | ** The agricultural landscape is undergoing a seismic shift. Farm robotics is at the forefront of this transformation. In 2024, the sector is grappling with funding challenges but is also witnessing a surge in innovation. As labor costs ris... |
25.07.2024 | Qualys unveils AI-powered API security in new WAS upgrade | Qualys has introduced enhanced Web Application Scanning (WAS) capabilities, incorporating advanced API security features powered by artificial intelligence. The new functionality aims to address the complex challenges of securing web applic... |
24.07.2024 | Unified security remediation platform startup Dazz raises $50M to enhance capabilities
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our missi... | Unified security remediation platform startup Dazz Inc. today announced that it has raised $50 million in new funding to fuel its mission to help security and engineering teams efficiently reduce exposures.
Founded and launched in 2021 by c... |
22.07.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — компрометация виртуальных сред VMWare ESXi, критическая уязвимость в плагине WordPress, уязвимость локального изменения пароля в Cisco Smart Software Manager On-Prem, патчи для 386 уязвимостей от Oracle, мошенническая схем... |
12.07.2024 | Over 16,400 Private and State-Owned Businesses Exposed to RegreSSHion Vulnerability | Over 16,400 Private and State-Owned Businesses Exposed to RegreSSHion Vulnerability
Fri, Jul 12, 2024 12:00 CET Report this content
Copenhagen, Denmark, July 12, 2024 - A critical security flaw known as RegreSSHion (CVE-2024-6387) has put o... |
08.07.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — критическая уязвимость в сервере OpenSSH, атаки на файловые серверы HTTP File Server, получение конфиденциальных данных через технологию Passkey, вредоносный домен Polyfill.io, вредоносное ПО в установщиках популярных прог... |
08.07.2024 | Security Week 2428: уязвимость в OpenSSH и поддельный эксплойт | Важная новость прошлой недели: в библиотеке OpenSSH обнаружена и закрыта уязвимость, получившая название RegreSSHion. Проблему нашли специалисты компании Qualys (общее описание, подробная техническая информация, новость на Хабре). Уязвимост... |
08.07.2024 | “GMO Cyber Attack Net de Diagnosis” now supports OpenSSH vulnerability detection GMO Cyber Secu rity by Ierae | - |
08.07.2024 | “GMO Cyber Attack Net de Diagnosis” now supports OpenSSH vulnerability detection GMO Cyber Secu rity by Ierae | “GMO Cyber Attack Net de Diagnosis” now supports OpenSSH
vulnerability detection [GMO Cyber Security by Ierae]
*GMO Internet Group*
Press release: July 8, 2024
**
“GMO Cyber Attack Net de Diagnosis” now supports OpenSSH
vulnerability ... |
02.07.2024 | Релиз OpenSSH 9.8 | 1 июля 2024 года состоялся релиз открытой реализации клиента и сервера для работы по протоколам SSH 2.0 и SFTP — инструмента OpenSSH 9.8. В новой версии проекта исправлена критическая уязвимость CVE-2024-6387 (под названием regreSSHion), а ... |
02.07.2024 | “RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux | Enlarge reader comments 61
Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that can be exploited to give attackers complete control of Linux and Unix servers with no authentication required.
The ... |
01.07.2024 | В OpenSSH найдена критическая уязвимость, позволяющая удалённо выполнить код с правами root на серверах с Glibc | 1 июля 2024 года эксперты по ИБ из Qualys опубликовали информацию, что в OpenSSH (с версии >= 8.5 и < 4.4) обнаружена критическая уязвимость CVE-2024-6387 под названием regreSSHion, позволяющая удалённо выполнить код с правами root на... |
21.05.2024 | Qualys Enterprise TruRisk Platform Now Accelerates Federal Agency's Zero-Trust Journey with Automated Compliance for OMB M-24-04 and CISA BOD 23-01 | New update uniquely brings External Attack Surface Monitoring (EASM), risk-based vulnerability management and patch management into a single unified FedRAMP-authorized platform
WASHINGTON, May 21, 2024 /PRNewswire/ -- Qualys, Inc. (NASDAQ: ... |
09.05.2024 | Are you putting your business at risk by not patching these common vulnerabilities? | Patching is something that we all know we have to do. But it is easier said than done. In reality, patching can be hard due to problems around application compatibility, having adequate downtime windows, or more pressing business risks to m... |
03.05.2024 | The changing face of the cybersecurity market [Q&A] | The cybersecurity world is a fast changing one with a constant arms race between attackers and defenders.
New entrants are always coming to the market with innovative technologies to solve particular problems. We spoke to Justin Somaini, a ... |
24.04.2024 | The NIST/NVD situation and vulnerability management programs | In the infosec world we continually preach about “defense in depth,” or layered security. The idea is that if a defensive measure at one layer fails, there are additional layers behind it that serve as a safety net. An interesting applicati... |
16.04.2024 | Дорога кибербезопасность к 2025 году | - |
03.04.2024 | Deep tech start-up SECTA5 doubles the speed of cybersecurity threat analysis and response | SINGAPORE – Media OutReach Newswire – 3 April 2024 – Singapore deep tech start-up SECTA5 has launched its flagship product–Cartographer–a revolutionary platform powered by Artificial Intelligence aimed at helping companies speed up their cy... |
31.03.2024 | World Backup Day -- We need to change the name | It remains essential to make copies of the most important data, World Backup Day has rightly been calling for this for years. But today the biggest risk to our data isn’t the traditional business continuity and disaster recovery scenarios f... |
31.03.2024 | Exploring the Depths: The Core Components of IT Security | Share
Tweet
Share
Share
Email
In today’s digital age, where technology permeates every aspect of our lives, ensuring the security of our information and systems has become paramount. As businesses rely more on digital infrastructure, the ri... |
05.02.2024 | Qualys Inks Distribution Deal in Singapore with Ingram Micro for Full Enterprise TruRisk Platform Portfolio | New collaboration broadens Qualys' reach in Southeast Asia
SINGAPORE, Feb. 5, 2024 /PRNewswire/ -- Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security, and compliance solutions, today announced... |
05.02.2024 | ТОП-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — вредоносные пакеты в Python Package Index, фишинговые письма от Минцифры России, новый вариант программ-вымогателей Phobos семейства FAUST, важные уязвимости в syslog() библиотеки GNU C и детали атаки на системы Cloudflare... |
15.12.2023 | Web application security -- five ways to improve your approach | Web applications remain one of the most targeted areas for threat actors. According to Verizon’s Data Breach Investigations Report, web application attacks were behind 26 percent of all successful attacks during the twelve months covered. Y... |
06.11.2023 | Самые громкие события инфобеза за октябрь 2023 года | Всем привет! Как обычно, подводим итоги ушедшего месяца дайджестом самых примечательных ИБ-новостей. В октябре почти все популярные дистрибутивы под Линукс оказались под угрозой двух критических уязвимостей, а десятки тысяч роутеров и свитч... |
26.10.2023 | ベリタスが「Veritas™ 360 Defense」を発表 - オンプレミスとクラウドにわたるサイバーレジリエンスを実現 | セキュアなマルチクラウドデータ管理のリーダーである ベリタステクノロジーズ合同会社( https://www.veritas.com/ja/jp )(本社:東京都港区、以下「ベリタス」 )は本日、「Veritas™ 360 Defense」を発表しました。Veritas 360 Defenseは、この分野初の拡張可能なアーキテクチャとして、業界をリードするデータ保護、データガバナンス、データセキュリティ機能のすべてを統合して提供します。また、Veritas 360 Defen... |
24.10.2023 | Veritas™ 360 Defense to Deliver Cyber Resilience On-Prem and Across Clouds | Extensible architecture based on real-world testing with industry-leading security vendors
SINGAPORE, Oct. 24, 2023 /PRNewswire/ -- Veritas Technologies, the leader in secure multi-cloud data resilience, today announced Veritas 360 Defense,... |
22.09.2023 | Improving remediation in practice -- five ways get ahead on fixes | Remediating security issues and potential software vulnerabilities is one of the fastest ways to improve security and prevent attacks. It’s a standard process for security teams, and it should make the job easier for everyone involved. Yet ... |
05.09.2023 | Qualys опубликовала список из 20 наиболее эксплуатируемых уязвимостей злоумышленниками для кибератак и вредоносного ПО... | Американская технологическая платформа Qualys опубликовала список из двадцати самых опасных и наиболее эксплуатируемых уязвимостей злоумышленниками для совершения удалённых кибератак, а также для распространения вредоносного и вымогательско... |
17.08.2023 | Top 20 cloud native application protection platforms of 2023 | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
Exploiting gaps in cloud infrastructure that are leaving endpoints, identities and microservices exposed is a quick way for an attacker to steal crede... |
07.08.2023 | Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud | Image: ArtemisDiana/Adobe Stock
Cloud misconfiguration — incorrect control settings applied to both hardware and software elements in the cloud — are threat vectors that amplify the risk of data breaches. A new report from cloud security ve... |
01.08.2023 | Over half of Azure and Google Cloud deployments fail CIS benchmarks | Cloud misconfiguration is a critical issue as it amplifies the risk of data breaches and unauthorized access. But new research from Qualys shows that many cloud deployments on major platforms are failing Center for Internet Security (CIS) b... |
31.07.2023 | ТОП-5 ИБ-событий по версии Jet CSIRT | Сегодня в ТОП-5 — подробности критической уязвимости MikroTik RouterOS, инцидент с украденным ключом подписи Microsoft, новая RCE-уязвимость OpenSSH, обновление безопасности Ubuntu и Apple. Новости подготовил аналитик центра информационной ... |
19.07.2023 | The Email Threats Landscape, Q1 2023: Key Takeaways | Share
Tweet
Share
Share
Email
One of the most pressing concerns in the digital age is the abundance of cyber threats from all directions, with a large number of those threats coming from email. Users must be aware of what threats exist, how... |
24.05.2023 | Cohesity Expands Industry's Only Data Security Alliance and Announces New Integrations with Cybersecurity Leaders | Integrations Between Security and Data Management Leaders Can Improve Detection, Protection, and Recovery for Thousands of Companies Globally
London, UK — 23 May, 2023 — Cohesity, a leader in data security and management, today announced at... |
06.05.2023 | From details to big picture: Five approaches to improve security | Improving your organization’s cyber security posture is essential to maintain brand trust. The challenge for the C-suite is to look at both the big picture and the finite details, translating your overall strategy for managing risk into act... |
10.03.2023 | 5 steps to gain control of vulnerability management for your enterprise | Over the last decade, organizations have significantly scaled up their business processes. They’ve increased the amount of technology they use, the size of their teams spinning up new systems, and the number of assets they have created. How... |
01.03.2023 | Asset management and security -- how to secure your whole tech stack | In a tumultuous geopolitical environment, organizations use digital transformation initiatives to accelerate and maintain their productivity. Companies want IT to increase innovation and improve the efficiency of processes across their busi... |
20.02.2023 | Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint Security | Every enterprise is in an endpoint security arms race. Attackers adapt their tactics faster than the most advanced security teams can react. One of the most compelling insights from comparing successive editions of Gartner’s Hype Cycle for ... |
01.02.2023 | Qualys Introduces GovCloud, a FedRAMP Ready (High Impact Level) Cybersecurity Platform | Qualys, Inc., a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, announced its new GovCloud platform along with the achievement of FedRAMP Ready status at the High impact level, from the Federal ... |
27.01.2023 | 10 steps every business can take to avoid a cybersecurity breach | Check out all the on-demand sessions from the Intelligent Security Summit here.
Businesses that survive cyberattacks understand that breaches are inevitable. That’s a strong motivator to make cyber-resilience and business recovery a core pa... |
16.01.2023 | Global Cyber Security Leaders convening in DAVOS at the CFF Cyber Future Dialogue 2023 | Cyber Future Foundation Davos Cyber Future Dialogue 2023 at Schatzalp
Cyber Future Foundation Davos Global Dialogue Live on LinkedIn
Select speakers from Delegation to Davos Cyber Future Dialogue 2023
Cybersecurity leaders stand side by sid... |
13.12.2022 | Why the manufacturing sector must make zero trust a top priority in 2023 | Check out all the on-demand sessions from the Intelligent Security Summit here.
By making zero trust a high priority in 2023, manufacturers can close the IT and operational technology (OT) gaps that keep them open to attack. Despite million... |
05.12.2022 | Top 10 risk-based vulnerability management (VM) tools for 2022 | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
Table of contents
What are risk-based vulnerability mana... |
23.11.2022 | Where CISOs are getting quick zero-trust wins today to save tomorrow’s budgets | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
To shield their budgets from further cuts, CISOs are goi... |
15.11.2022 | The manufacturing industry’s security epidemic needs a zero-trust cure | This article is part of a VB special issue. Read the full series here: Zero trust: The new security paradigm.
Manufacturers’ tech stacks and industrial control systems (ICS) were designed to deliver speed and transaction efficiency first, w... |
10.11.2022 | Qualys Security Conference 2022: Corralling horses in an expanding edge rodeo | Image: Tada Images/Adobe Stock
Edge is an asset. More specifically, an edge computing estate is composed of a variety of digital assets that work in a strategically located and variously distributed set of locations to provide data streams ... |
24.10.2022 | How self-healing endpoints are a solution to identities under siege | Register now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from executives from Service Now, Credit Karma, Stitch Fix, Appian, and more. Learn more.
>>Don’t miss our special issue: How Data Privacy Is... |
23.08.2022 | Taking the risk-based approach to vulnerability patching | As one of the most effective ways to prevent attacks on IT assets, it is universally acknowledged and known that patching vulnerabilities is a critical process. But as the volume of vulnerabilities discovered in the tools we use continues t... |
22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Most organizations are behind on hardening their endpoints with zero trust, enabling cyberattackers to use malicious sc... |
22.08.2022 | How cybersecurity vendors are misrepresenting zero trust | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
The zero-trust vision that cybersecurity vendors are selling isn’t the reality enterprises are experiencing. The discon... |
05.07.2022 | The Multipoint Group and Qualys announce long-term strategic collaborations and geographic expansions | leading provider of Cyber cloud software for information security and compliance.
Cyber Strong Solution
A pioneer and leading provider
With the support of its offices and channel network, Multipoint will support the expansion of Qualys' mar... |
06.06.2022 | Qualys updates vulnerability management with automated workflows | Security and compliance specialist Qualys is releasing the latest version of its Vulnerability Management, Detection and Response (VMDR) solution with TruRisk, which offers risk-based vulnerability management for insights into an organizati... |
31.05.2022 | Linux Malware To Watch Out For in 2022 | April Fowell, Tech Times 31 May 2022, 02:05 am
Linux attacks are prevalent and it's important to know what you are up against to better prepare for such attacks. Linux attacks can be carried out from a variety of methods, including the Inte... |