Cloud + BYOD + IoT = major security gaps

Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a survey from Axonius, which reveals how trends including the ever-increasing number of end-user device… Continue reading Cloud + BYOD + IoT = major security gaps

43% of IT professionals are still tracking assets in spreadsheets

43% of IT professionals report using spreadsheets as one of their resources for tracking assets, according to Ivanti. Further, 56% currently do not manage the entire asset lifecycle, risking redundant assets, potentially creating a risk, and causing un… Continue reading 43% of IT professionals are still tracking assets in spreadsheets

Cybersecurity automation? Yes, wherever possible

There was a time when companies were hesitant about their IT and security teams using automation to discharge some of their duties. “I think much of that was due to the feeling that if a task was automated and something went wrong, IT was not in … Continue reading Cybersecurity automation? Yes, wherever possible

Ransomware attack leaves Johannesburg residents without electricity

A ransomware attack aimed at City Power, the electricity provider for Johannesburg (aka Joburg), South Africa, has resulted in some residents temporarily without power. While the provider’s operational technology (OT) network hasn’t been hi… Continue reading Ransomware attack leaves Johannesburg residents without electricity

Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach prevention by reducing attack surfaces. Here’s a transcript of the podcast for your convenience. Welcom… Continue reading Endpoint breach prevention by reducing attack surfaces

Qualys provides visibility of inaccessible IT assets

Qualys announced a new Out-of-Band Configuration Assessment (OCA) module that allows customers to achieve complete visibility of all known IT infrastructure by pushing vulnerability and configuration data to the Qualys Cloud Platform from systems that … Continue reading Qualys provides visibility of inaccessible IT assets

Securing healthcare organizations: The challenges CISOs face

Healthcare organizations are ideal targets for criminals looking to steal personal and other sensitive information, as the industry is lagging behind when it comes to cybersecurity. Healthcare breaches involving ransomware increase year-over-year, but … Continue reading Securing healthcare organizations: The challenges CISOs face

How security leaders can be empowered to drive results

The overwhelming demands on security leaders today can have a paralyzing effect. Gartner analysts provided guidance to security and risk leaders and practitioners on how to be empowered to adapt their people, processes and technologies to address the o… Continue reading How security leaders can be empowered to drive results

Discover all IT assets across your global hybrid infrastructure

Qualys announced Asset Inventory (AI), a new cloud app with capabilities that provide customers a single source of truth for IT assets spread across hybrid environments including on-premises, endpoints, clouds and mobile, with synchronization capabilit… Continue reading Discover all IT assets across your global hybrid infrastructure

IBM adds Qualys technology to its Managed Security Services portfolio

Qualys announced at RSA Conference 2017 an expanded partnership with IBM that will add Qualys continuous cloud-based IT security and compliance technology to its Managed Security Services (MSS) portfolio. IBM will integrate Qualys technology to enable its customers with enhanced visibility of IT assets, vulnerabilities and threat data, accelerating how they prioritize remediation and simplify management of their IT security and compliance posture at scale. Extending digital enterprise infrastructure across global cloud and on-premises deployments … More Continue reading IBM adds Qualys technology to its Managed Security Services portfolio