A syndication feed of all the blogs on this system
539 followers 8 نوشته / هفته
TotalCloud Insights: A Wake-Up Call on Cloud Database Security Failure Rates

In part 1 of this two-part blog, we explored how to safeguard cloud databases from SQL Server threats and lateral movement risks. In this second part, we turn our focus to a comparative analysis of database security across three major cloud service providers (CSPs), AWS, Azure, and GCP, as well as the varying failure rates of database security controls....

Fri May 10, 2024 00:32
Elevating Security: Qualys Unveils First Solution for Scanning AWS Bottlerocket in Amazon EKS and Amazon ECS

With this new offering, Qualys establishes itself as the first and only vendor solution with the unique ability to scan AWS Bottlerocket instances directly using the Qualys Cloud Agent. This innovative capability empowers organizations to comprehensively manage and mitigate risks at both the host OS and container levels. In this article, we delve into...

Thu May 9, 2024 21:29
How to Create Collaboration and Shared Goals with IT and Security Teams 

In today’s ITSM landscape, merging IT operations and security practices is no longer “ideal”, but imperative. According to a recent Gartner® Board of Directors Survey 1, 88% of respondents indicated that their organization perceives cybersecurity as a business risk. This was up from 58% in 2016, which we believe highlights the necessity for a cohesive...

Thu May 9, 2024 19:27
Detect & Address the Top 10 MITRE ATT&CK Techniques for Ransomware Using Policy Compliance

In cybersecurity, the battle against ransomware is a pivotal challenge for organizations worldwide. Attackers are consistently refining their methods, highlighting the critical need for businesses to remain proactive in their defense strategies. To effectively address this threat, it is essential for organizations to understand the tactics, techniques,...

Thu May 9, 2024 04:01
Qualys Is Proud to Sign CISA’s Secure by Design Pledge

Cybersecurity leaders in the U.S. are very familiar with the Cybersecurity and Infrastructure Security Agency (CISA) and their important work to keep the internet, our country, and its citizens safe from cyber threats. As part of their efforts, CISA has identified secure by design software as a key element to ensuring the integrity and security of our...

Wed May 8, 2024 00:07
Introducing CyberSecurity Asset Management 3.0 with Expanded Discovery and Cyber Risk Assessment

Qualys is re-defining attack surface management with CyberSecurity Asset Management (CSAM) 3.0, expanding the most comprehensive attack surface coverage on the market to include patent-pending EASM discovery and scan, passive sensing for unmanaged/untrusted devices built in to the Qualys agent, and new third-party API-based connectors to provide continuous...

Mon May 6, 2024 15:59

خوراک خبری خود را بسازید

آیا آماده هستید تا آن را اجرا کنید؟
بدون نیاز به کارت اعتباری، یک دوره آزمایشی 14 روزه را شروع کنید.

ایجاد حساب‌کاربری