Should government officials complete basic cyber security training?

Venafi announced the results of a survey of 515 IT security professionals’ views on the cyber security literacy of government officials. The survey was conducted August 4-9, 2018, at the Black Hat conference in Las Vegas. According to the survey, eight… Continue reading Should government officials complete basic cyber security training?

How to gain visibility with global IT asset inventory

In this podcast recorded at Black Hat USA 2018, Pablo Quiroga, Director of Product Management at Qualys, talks about how to gain unprecedented visibility with global IT asset inventory. Here’s a transcript of the podcast for your convenience. My name i… Continue reading How to gain visibility with global IT asset inventory

Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

In this podcast recorded at Black Hat USA 2018, Anthony Mogannam, Product Manager, SME/SMB Solutions at Qualys, talks about issues related to open source software and Qualys Community Edition. Here’s a transcript of the podcast for your convenience. He… Continue reading Qualys Community Edition: Discover IT assets, manage vulnerabilities, scan web apps

Incorporating sensitive asset data into your vulnerability and compliance program

In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating inaccessible or sensitive asset data into your overall vulnerability and compliance prog… Continue reading Incorporating sensitive asset data into your vulnerability and compliance program

Secure your open source components automatically, continuously, and silently

In this podcast recorded at Black Hat USA 2018, Azi Cohen, General Manager at WhiteSource, talks about open source lifecycle management. WhiteSource manages open source license compliance and security by integrating into your build process, no matter y… Continue reading Secure your open source components automatically, continuously, and silently

How to develop the right strategy to increase IoT security

As more and more devices become connected, many industries that were previously secure are experiencing new threats or attacks to their devices and services. In this podcast recorded at Black Hat USA 2018, Mark Hearn, Strategic Business Development Man… Continue reading How to develop the right strategy to increase IoT security

Making informed decisions: The importance of data driven security

When deciding what product to buy, the information the vendor offers about the product is helpful, but not nearly enough: you need to analyze individual product results and peruse comparative reports to make the right choice for your organization. In t… Continue reading Making informed decisions: The importance of data driven security

Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing attack surfaces. Here’s a transcript of the podcast for your convenience. Welcom… Continue reading Endpoint breach prevention by reducing attack surfaces

Hack the Marine Corps bug bounty program kicks off

The U.S. Department of Defense (DoD) and HackerOne launched the Department’s sixth bug bounty program, Hack the Marine Corps. The bug bounty challenge will focus on Marine Corps’ public-facing websites and services in order to harden the defenses of th… Continue reading Hack the Marine Corps bug bounty program kicks off