GDPR: 12 steps businesses can use to prepare right now

In this podcast, Darron Gibbard, Chief Technical Security Officer, EMEA, Qualys, talks about preparing for the GDPR and provides a good basis to start your program and understand what departments you need to be working with, and how you should be engaging with your respective businesses. Here’s a transcript of the podcast for your convenience. Hello, my name is Darron Gibbard, I’m the Chief Technical Security Officer for Qualys based in the EMEA region. I’m … More Continue reading GDPR: 12 steps businesses can use to prepare right now

How High-Tech Bridge uses machine learning

In this podcast, Ilia Kolochenko, CEO at High-Tech Bridge, talks about the difference between artificial intelligence and machine learning, and illustrates how his company uses machine learning to reduce human time without impacting testing quality or liability. Here’s a transcript of the podcast for your convenience. Good morning, my name is Ilia Kolochenko, I’m CEO and founder at High-Tech Bridge. Today we have a lot of companies who speak about AI, but in my opinion … More Continue reading How High-Tech Bridge uses machine learning

InfoArmor: Operatively-sourced threat intelligence

In this podcast, Mike Kirschner, Senior Vice President of Advanced Threat Intelligence at InfoArmor, talks about this dark web operatively sourced intelligence firm that is really focused on dark web surveillance and sourcing of compromise and breach data through operative engagement. Here’s a transcript of the podcast for your convenience. Hi, I’m Mike Kirschner, I’m the Senior Vice President of InfoArmor Advanced Threat Intelligence Division. We are a dark web operatively sourced intelligence firm that … More Continue reading InfoArmor: Operatively-sourced threat intelligence

Regional regulatory compliance trends: Strategies and implications

In this podcast, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about regulatory compliance trends that across a variety of different regions in the world, as well as strategies for dealing with them. Here’s a transcript of the podcast for your convenience. Hello, I’m Tim White, Director or Product Management at Qualys. Today I’m going to talk about some regulatory compliance trends that we’re seeing across a variety of different regions in … More Continue reading Regional regulatory compliance trends: Strategies and implications

Bored employees seen as biggest potential data security risk

Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a snapshot poll conducted by Centrify at Infosec Europe in London this week. Of the 165 respondents, more than a third (35%) cite distraction and boredom as the main cause of human error. Other causes include heavy workloads (19%), excessive policies and compliance regulations (5%), social media (5%) and password sharing (4%). … More Continue reading Bored employees seen as biggest potential data security risk

Attack rates are increasing across the board

Finance and technology are the sectors most resilient to cyber intrusions, new research from Vectra Networks has found. The company released the results of its Post-Intrusion Report, based on data from a sample set of nearly 200 of its enterprise customers. They looked at the prevalence of strategic phases of the attack lifecycle: command-and-control (C&C), reconnaissance, lateral movement, botnet, and exfiltration attacker behaviours across thirteen industries. Over 90 days (January-March 2017), the company monitored 2,145,708 … More Continue reading Attack rates are increasing across the board

Application security trends: What you need to know

Today at Infosecurity Europe 2017, High-Tech Bridge released a summary report on application security trends for Q1 – Q2 2017. Statistical data mentioned in the report largely comes from the ImmuniWeb Application Security Testing Platform and High-Tech Bridge’s free web security services, but also leverages a wealth of data from various open sources. The most interesting and important trends are outlined below. Bug Bounty fatigue trend is one that will continue The Bug Bounty fatigue … More Continue reading Application security trends: What you need to know

High-Tech Bridge and DenyAll partner to defend web applications and services

High-Tech Bridge, recently named Gartner Cool Vendor 2017, and DenyAll, a Rohde & Schwarz Cybersecurity company, joined the efforts to combat cybercrime and defend corporate web applications and web services. The announced technology integration enables joint customers to export vulnerability data from ImmuniWeb Portal and import it to DenyAll WAF in just a few clicks. Once imported, the vulnerabilities will be virtually patched by the WAF preventing any attempts of their malicious exploitation. This results … More Continue reading High-Tech Bridge and DenyAll partner to defend web applications and services