Author: admin
It’s (always) time to change
History gives us plenty of reminders of the dangers of not changing with the times. The market quickly forgets those who get left behind. Derek Britton looks at what’s changing. […]Managing CISA Known Exploited Vulnerabilities with Qualys VMDR
CISA recently released a directive recommending urgent and prioritized remediation of actively exploited vulnerabilities. Both government agencies and corporations should heed this advice. This blog outlines how Qualys Vulnerability Management,Ingecom alcanza un acuerdo de distribución con ThreatQuotient
El fabricante es el primer proveedor de plataformas de inteligencia contra amenazas (TIP) que ofrece servicios directamente desde España. La plataforma ThreatQ está diseñada para proporcionar a las empresas la […]The Secret of DLP Migration? It Doesn’t Have to Hurt
Too often, I talk to customers who had been settling previously for a sub-optimal, legacy DLP solution because they feared the migration process was just too complex and frustrating. The […]Profitap IOTA v2.2.2 Release Notes
The newly released IOTA software version 2.2.2 includes the following new features:Why Data Protection Regulations Require a Watching Brief
Alexandra: In this discussion around the challenges facing international businesses who want to protect critical data and remain compliant, Senior Sales Engineer Alexandra Willsher and Corporate Counsel and Data Protection […]Elasticsearch is Here!
Introducing Privilege Management for Unix & Linux (PMUL) and Active Directory Bridge (AD Bridge) v22.1 The release of Privilege Management for Unix & Linux 22.1 and Active Directory (AD) Bridge […]Simplifying Cloud Asset Identification in a Multi-Cloud Environment
Enterprises struggle to get an accurate asset inventory in multi-cloud or hybrid cloud environments. Qualys enhances the metadata for cloud assets while simplifying the collection process. This blog explains how […]Empowering data privacy with the right network visibility solution
In the digital transformation age, the cybersecurity industry received tremendous spotlight with respect to the pervasive capability of the IT domain to have full access (literally) to any digital asset, […]How Threat Intelligence Can Help Businesses Respond To Cyberthreats
Expert Insights speaks to Chris Jacob, Vice President of Threat Intelligence Engineering at ThreatQuotient, to discover how organizations can leverage actionable threat intelligence to inform their threat detection, prevention and […]Load More