Category: News
CISA BOD 23-01: Meeting and Exceeding CISA Requirements with Qualys
The latest Binding Operational Directive from the Cybersecurity and Infrastructure Security Agency (CISA) BOD 23-01 requires agencies to implement an essential cybersecurity practice within the next 6 months. While this […]AIOps and Observability: What’s the Difference? | Riverbed
Interest in AIOps and observability tools sky-rocketed over the past couple of years as IT teams face the challenge of managing today’s IT infrastructures. The data explosion from modern architectures […]Anticipation and Action: What’s Next in SOC Modernization
“Wisdom consists of the anticipation of consequences.” – Norman Cousins In the cybersecurity industry, we’ve become a lot wiser in the face of relentless and increasingly crafty adversaries. It is now […]The Increasingly Complex Threat Landscape Must be Fought with Simplicity
Indeed, new research from Forcepoint found 65% of U.K. and U.S. CNI organizations have fallen victim to a cyberattack and 57% to a ransomware attack in the last 12 months […]“See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022
Home » Titus Blog » “See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022 HelpSystems Webmaster · Thursday, October 6th, 2022 What comes to […]CISA Directive: Federal Agencies Must Improve Cybersecurity Asset Visibility and Vulnerability Detection
CISA states the directive supports many other mandates and guidance that has previously been established, including the Executive Order 14028 on Improving the Nation’s Cybersecurity (specifically Sec. 7: Improving Detection […]In-Depth Look Into Data-Driven Science Behind Qualys TruRisk
Vulnerability Management is a foundational component of any cybersecurity program for the implementation of appropriate security controls and the management of cyber risk. Earlier this year Qualys introduced the latest […]Help Enable Smarter Decisions During Cybersecurity Awareness Month
Help Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports […]Inside the James Webb Attack Image
Appending data to an image is a well-known way of hiding malware. In this case, the executable data is Base64 encoded and surrounded by markers indicating it is a certificate. […]Cyber Claims: The Real Role of Forensic Analysis | BeyondTrust
What is a Cyber Claim? A cyber claim is how a cyber insurance policy – insuring against ransomware, malware, cyber breaches, etc. – is distributed to the policyholder after a […]Load More