Author: admin
Close the Gap Between IT & Security with Our New App: Qualys VMDR for ITSM
In recent years, the world has seen an alarming rise in cyber-attacks. According to the just released Verizon DBIR report, the rate of increase of ransomware attacks in 2021 was […]Reduce Time Or Do Not, There Is No Shift
Reduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security operations. In this post, we’d […]Webinar: Don’t Miss The Quickest Proof of Concept Ever! Zero Trust CDR vs Malware
The technology is so quick and effective, that it takes us as little as 10 minutes to show you how it works. Don’t believe us? Join Aaron Mulgrew, Solution Architect […]Are you SURE your security platform is helping your business?
In short, most security products focus on “what” they’re doing rather than what they’re doing for you. That’s backwards. Nobody deploys security for fun; they do so to achieve important […]BeyondTrust and the NASCIO 2022 Midyear Conference
Last month saw the successful completion of the NASCIO 2022 Midyear Conference, which provides an opportunity for CIOs, top IT officials, and industry partners to collaborate in support of state […]Introducing Qualys VMDR 2.0
Over the last five years, the number of vulnerabilities disclosed has doubled. The speed at which vulnerabilities are weaponized and leveraged for mass exploitation is down to mere days (from […]Automation. Where do We Go from Here?
What’s next in the evolution of security automation and orchestration? Over the past 20 years we’ve seen significant improvements in cybersecurity technology and tools. For example, new versions of intrusion […]Catch Up with Forcepoint at RSAC 2022
Hear from our CEO and our Global CTO On June 8, 11:10am PT, come watch a keynote session with our CEO, Manny Rivelo, on Security’s Dirty Little Secret: The Conservation […]Defeating a brand new Microsoft Office zero-day attack with ZT CDR
Initially, at the time of writing, only five of sixty vendors available marked this file, now known as CVE-2022-30190, as malicious. And as of 30/05/2022, only twenty-two of sixty vendors are […]Cybersecurity Requirements: How Define Them & Map to the Right Product
We’ve probably all heard what’s important when buying a house, “Location, Location, Location”, but what’s most important when buying a cybersecurity product? As the title indicates, it’s the requirements you […]Load More