The Power of Remediating Vulnerabilities in Real-Time

Qualys is a sponsor of TechSpective Zero day exploits make for dramatic headlines, but the reality is that most cyberattacks—particularly the ones responsible for the biggest and most infamous data breaches—tend to target avoidable configur… Continue reading The Power of Remediating Vulnerabilities in Real-Time

Qualys Introduces VMDR: Vulnerability Management, Detection, and Response

Qualys is a sponsor of TechSpective Qualys customers and executives are gathered in Las Vegas this week for the annual Qualys Security Conference. The event officially kicks off with an opening keynote on Wednesday morning, but Qualys wanted to get the… Continue reading Qualys Introduces VMDR: Vulnerability Management, Detection, and Response

Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys is a sponsor of TechSpective There has been an increased focus this year on asset inventory and the idea that you can’t have effective cybersecurity if you don’t even have an accurate picture of the devices and applications in your e… Continue reading Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 1

Just a few years ago, most IT environments were made up of deployed servers on which personnel installed applications, oftentimes as many as that one system could handle. They then remained and ran that way for years. In the meantime, the IT team maint… Continue reading Best Practices for Using Tripwire Enterprise in Dynamic Environments – Part 1

Visibility and the Importance of a Single Source of Truth

Qualys is a sponsor of TechSpective How many endpoints or devices are on your network right now? First of all, are you confident that you actually know the answer to that question. Assuming you think you do, what are the odds that other teams or indivi… Continue reading Visibility and the Importance of a Single Source of Truth

Topic Segment: Security Roundtable – Paul’s Security Weekly #612

    – Vulnerability Management– Patching– Asset Management– System Hardening Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements Register for our upcoming webcasts with Viavi & IS… Continue reading Topic Segment: Security Roundtable – Paul’s Security Weekly #612

Managed Vulnerability Management? Yes, You Read That Right

The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can only go so far. Scan… Continue reading Managed Vulnerability Management? Yes, You Read That Right

How to Build a System Hardening Program From the Ground Up

System hardening is more than just creating configuration standards; it involves identifying and tracking assets, drafting a configuration management methodology, and maintaining system parameters.

The post How to Build a System Hardening Program From the Ground Up appeared first on Security Intelligence.

Continue reading How to Build a System Hardening Program From the Ground Up

Medigate raises $15 million Series A for medical device security

Medigate, a startup that offers cybersecurity services specific to medical devices, has raised $15 million in Series A funding, the company announced Tuesday. Medigate provides a platform that is meant to identify medical devices on a network, fingerprint them then monitor those devices for suspicious behavior. Mecical devices need specialized security attention that is not satisfied with broader forms of internet of things security, according to Medigate CEO Jonathan Langer. “For medical devices, general IoT security falls short,” Langer told CyberScoop in an email. “The uniqueness of the devices, the sheer volume of different types of devices and the complexity of clinical networks is daunting. The ability to find and secure devices, from MRIs to glucose meters and to alert a hospital of anomalies requires security that understands clinical networks.” The company says the platform considers not just basic indicators like IP addresses, but also context such as the device’s model and purpose. […]

The post Medigate raises $15 million Series A for medical device security appeared first on CyberScoop.

Continue reading Medigate raises $15 million Series A for medical device security

Why You Need to Master the Basics – A Three Step Campaign

When I was growing up, my father enrolled me in martial arts at an early age. I liked everything about it. I liked the friends I made, I liked the sense of achievement getting the next belt, I liked breaking boards ,but more than anything, I liked to f… Continue reading Why You Need to Master the Basics – A Three Step Campaign