Category: News
Introducing Qualys VMDR 2.0
Over the last five years, the number of vulnerabilities disclosed has doubled. The speed at which vulnerabilities are weaponized and leveraged for mass exploitation is down to mere days (from […]Automation. Where do We Go from Here?
What’s next in the evolution of security automation and orchestration? Over the past 20 years we’ve seen significant improvements in cybersecurity technology and tools. For example, new versions of intrusion […]Catch Up with Forcepoint at RSAC 2022
Hear from our CEO and our Global CTO On June 8, 11:10am PT, come watch a keynote session with our CEO, Manny Rivelo, on Security’s Dirty Little Secret: The Conservation […]Defeating a brand new Microsoft Office zero-day attack with ZT CDR
Initially, at the time of writing, only five of sixty vendors available marked this file, now known as CVE-2022-30190, as malicious. And as of 30/05/2022, only twenty-two of sixty vendors are […]Cybersecurity Requirements: How Define Them & Map to the Right Product
We’ve probably all heard what’s important when buying a house, “Location, Location, Location”, but what’s most important when buying a cybersecurity product? As the title indicates, it’s the requirements you […]Qualys FIM: Be Compliance Ready with Intuitive, Ready-to-Use File Monitoring Profiles
Requirements for file-level security are often set by laws, regulations, and audit standards. These include identification of what must be protected, the various controls required to implement security, and outcomes […]Taking a Data-Driven Approach to SOC Operations
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them […]Taking a Data-Driven Approach to SOC Operations
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them […]Successfully Migrating to an SSE Platform
While it’s fair to say migrating to a new, unified security SSE platform requires a bit of planning, it’s clear that a successful implementation provides numerous organizations benefits by allowing […]What is an Open Port & What are the Security Implications? | BeyondTrust
What are ports? A port is a software-defined value that identifies a network endpoint. Any connection made on a TCP/IP network has a source and destination port that are used […]Load More