Author: admin
Risk-based Remediation Powered by Patch Management in Qualys VMDR 2.0
According to the recently released Verizon DBIR report, vulnerability exploitation continued to be one of the top three attack vectors exploited by bad actors in 2021 to break into organizations. […]Security Orchestration: Beware of the Hidden Financial Costs
Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the inclusion of security automation and orchestration […]The Next Generation of CDR Technology
Introducing the Next Generation of CDR! Not any more… Zero trust + CDR = Zero Trust CDR. Zero Trust CDR mitigates the threat of even the most advanced zero-day attacks […]Data Classification in the Finance World
HelpSystems Webmaster · Monday, June 20th, 2022 When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face […]Unix/Linux Privilege Management: Should You Sudo? Here’s What It Does and Why It’s Not Enough | BeyondTrust
In this blog, I will introduce you to sudo and su, two of the most important and most often used commands in Linux, and talk about the basic pros and […]Defending Against Scheduled Task Attacks in Windows Environments
Scheduling tasks is one of the most popular attack techniques used by threat actors to establish persistence on a victim’s machine. The Qualys Research Team investigated different ways that attackers […]Automated phishing site takedown with Namecheap and ThreatMark API integration
Phishing is the scourge of the modern digital era. Verizon’s Data Breach Investigations Report notes that over 82% of data breaches include the human element, with phishing as the main […]ThreatQuotient Recognized as a 2022 Top Place to Work by The Washington Post
Provider of security operations solutions stands out for excellent workplace culture that has contributed to industry recognition for the companyReston, Va. – June 17, 2022 – ThreatQuotient™, a leading security […]The Million-Dollar Question in 2022
In a world where you can work from anywhere (and everyone knows it!), what keeps a person where they are or intrigues them to look elsewhere?” That’s good news for […]Windows Follina Vulnerability Mitigation
On May 27th 2022, a new zero-day remote code execution (RCE) vulnerability (CVE-2022-30190P) was discovered in the Microsoft Support Diagnostic Tool (MSDT). According to Microsoft, “An attacker who successfully exploits […]Load More