Author: admin
Integrating JIRA to the Qualys Cloud Platform
This is the second in a blog series on integrations to the Qualys Cloud Platform. This post looks at what are the requirements to build a successful integration and workarounds […]Security Automation, Lessons Learned from Top Gun: Maverick
Security Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve […]The Evolution of Cybersecurity
We can’t control it, but we can evolve our thinking, our philosophy, our program and our architecture.” We can’t fall into old habits and try to treat everything the same […]Understanding and Protecting CUI
HelpSystems Webmaster · Thursday, July 14th, 2022 The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more […]AWS Root vs IAM User: What to Know & When to Use Them | BeyondTrust
In Amazon Web Services (AWS), there are two different privileged accounts. One is defined as Root User (Account owner) and the other is defined as an IAM (Identity Access Management) […]July 2022 Patch Tuesday | Microsoft Releases 84 Vulnerabilities with 4 Critical, plus 2 Microsoft Edge (Chromium-Based); Adobe Releases 4 Advisories, 27 Vulnerabilities with 18 Critical.
Microsoft has fixed 84 vulnerabilities (aka flaws) in the July 2022 update, including four (4) vulnerabilities classified as Critical as they allow Remote Code Execution (RCE). This month’s Patch Tuesday cumulative […]Digital Experience Innovation & Acceleration
IT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu profitieren, müssen Unternehmen ihre IT-Infrastruktur modernisieren. Das gelingt jedoch nicht überThe Pendulum Effect and Security Automation
The last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before settling at an equilibrium, somewhere in the middle. […]Forcepoint Classification powered by Getvisibility combines AI-enhanced classification with award-winning DLP
Applying AI for accuracy, automation and efficiency While many competing data classification solutions make limited use of machine learning, they typically require manual training to deliver “intelligent” classification results. Forcepoint […]Reflecting on (One of) Gartner’s Cybersecurity Predictions
One of the stand outs across the eight predictions: Late last month, Gartner released its top eight cybersecurity predictions for 2022-23, encouraging cybersecurity leaders to use their eight predictions as […]Load More