Category: Qualys
Real-Time Defense of Multi-Cloud Environments From Malicious Attacks and Threats
Table of Contents Organizations today cannot detect real-time threats at runtime due to the multi-cloud infrastructure, resulting in the possibility of malicious actors exploiting the environment. It is imperative for […]macOS Patching Is Here!
Table of Contents In the past few years, many of our customers have seen a sharp increase in the number of Mac devices introduced to their environment. All those new […]Managing Security Configuration Risk with the Most Comprehensive Configuration Compliance Solution!
Table of Contents Qualys leads the industry with 850 policies, 19000 controls, 350 technologies, and 100 frameworks Remote and hybrid work, digital transformation, and customer experience initiatives require rapid and […]The January 2023 Oracle Critical Patch Update
Last updated on: January 18, 2023 This Oracle Critical Patch Update contains a group of patches for multiple security vulnerabilities that address 327 new security patches. Some of the vulnerabilities […]Detection of Vulnerabilities in JavaScript Libraries
JavaScript is a popular programming language which is an integral component while developing interactive and dynamic web applications. It allows developers to create engaging and responsive user interfaces, handling complex […]Implement Risk-Based Vulnerability Management with Qualys TruRisk™: Part 3
In this final blog of the series, we will discuss the importance of implementing effective risk-based remediation strategies to reduce the risk of vulnerabilities being exploited in your environment. In […]Qualys Threat Research Unit: Threat Thursdays, December 2022
Welcome to the fourth edition of the Qualys Threat Research Unit’s (TRU) “Threat Research Thursday”, where we collect and curate notable new tools, techniques, procedures, threat intelligence, cybersecurity news, malware […]Implement Risk-Based Vulnerability Management with Qualys TruRisk™ : Part 2
This blog is a continuation of our first blog on implementing risk-based vulnerability management with Qualys TruRiskTM. In the first blog, we covered how to correctly tag and categorize assets […]Operationalizing Qualys VMDR With Qualys TruRisk™ – Part 1
For today’s CISOs, managing cyber risk is Job #1 priority, and it’s a full-time concern. Security practitioners are spending a considerable amount of time responding to cybersecurity threats and finding […]The 9th Google Chrome Zero-Day Threat this Year – Again Just Before the Weekend
Google has released yet another security update for the Chrome desktop web browser to address a high-severity vulnerability that is being exploited in the wild. This is the ninth Chrome […]Load More