Author: admin
Implement Risk-Based Vulnerability Management with Qualys TruRisk™: Part 3
In this final blog of the series, we will discuss the importance of implementing effective risk-based remediation strategies to reduce the risk of vulnerabilities being exploited in your environment. In […]IT Strategy—Is a Democracy Merited?
IT decisions—not always popular, and often taken in isolation. What can IT leaders do to make IT strategy more inclusive and—crucially—more successful? It starts with trust, says Walid Hbeika, Chief […]XDR and the Age-old Problem of Alert Fatigue
XDR’s fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture According to 451 Research’s M&A Knowledgebase, cybersecurity M&A activity […]Security News—ChatGPT Mania Continues, AI’s Role in Cybersecurity, New Breaches at CircleCI and Slack and More
Defensive vs. offensive AI: Why security teams are losing the AI war Here’s an overview of some other cybersecurity stories getting our attention: CircelCI warns of security breach—Rotate your secrets! […]Qualys Threat Research Unit: Threat Thursdays, December 2022
Welcome to the fourth edition of the Qualys Threat Research Unit’s (TRU) “Threat Research Thursday”, where we collect and curate notable new tools, techniques, procedures, threat intelligence, cybersecurity news, malware […]Improving Digitized Work Processes with DEX | Riverbed
In my last blog article, I drew the comparison between the engine warning light in a car and IT monitoring. But what does that mean in detail? An excellent example […]How to TAP 40/100G BiDi connections
Bandwidth demand in data centers and campus networks is increasing due to growing virtualization. In data centers, this has a particular impact at aggregation points of top-of-rack switches, i.e., from […]Technology Alliance Outlook for 2023 and Beyond | BeyondTrust
‘Tis the season for being merry—and of course for all the end-of-year recaps and projections for next year. I wanted to jump on this bandwagon, or sleigh, to keep holiday […]2022, Naughty or Nice?
2022, Naughty or Nice? Noor Boulos There were so many notable things that have happened in 2022, here’s some to name a few. We have gotten back to a “normal” […]Security News—LastPass and Okta Hacks and More
Password manager company LastPass has confirmed that its customers’ encrypted password vaults, which store passwords and other secrets, were stolen in a data breach earlier this year. The intruders used […]Load More