Operational Technology Cyber Security Alliance aims to tackle OT threats

Cyber attacks on critical and industrial infrastructure are on the rise, impacting operational reliability and business risk across all industries, including utilities, manufacturing and oil & gas. Threats to operational technology (OT) can disrup… Continue reading Operational Technology Cyber Security Alliance aims to tackle OT threats

October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe

As predicted by Ivanti’s Chris Goettl, October 2019 Patch Tuesday came with a relatively small number of Microsoft updates and, curiously enough, with no security updates from Adobe. There is no report of any of the Microsoft bugs being exploited… Continue reading October 2019 Patch Tuesday: A small batch of updates from Microsoft, none from Adobe

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective once upon a time d… Continue reading Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Patch Tuesday, September 2019 Edition

Microsoft today issued security updates to plug some 80 security holes in various flavors of its Windows operating systems and related software. The software giant assigned a “critical” rating to almost a quarter of those vulnerabilities, meaning they could be used by malware or miscreants to hijack vulnerable systems with little or no interaction on the part of the user. Continue reading Patch Tuesday, September 2019 Edition

Critical Exim flaw opens servers to remote code execution, patch now!

The Exim mail transfer agent (MTA) is impacted by a critical vulnerability that may allow local or unauthenticated remote attackers to execute programs with root privileges on the underlying system. About Exim Exim is the most widely used MTA today and… Continue reading Critical Exim flaw opens servers to remote code execution, patch now!

Visibility and the Importance of a Single Source of Truth

Qualys is a sponsor of TechSpective How many endpoints or devices are on your network right now? First of all, are you confident that you actually know the answer to that question. Assuming you think you do, what are the odds that other teams or indivi… Continue reading Visibility and the Importance of a Single Source of Truth

Knowing what’s on your hybrid-IT environment is fundamental to security

In this Help Net Security podcast recorded at Black Hat USA 2019, Shiva Mandalam, VP of Products, Visibility and Control at Qualys, talks about the importance of visibility. Whether on-prem (devices and applications), mobile, endpoints, clouds, contain… Continue reading Knowing what’s on your hybrid-IT environment is fundamental to security

Securing the cloud: Visibility, compliance and vulnerability management

In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. Here’s a transcript of the podcast for your convenience. Hello and welcome to t… Continue reading Securing the cloud: Visibility, compliance and vulnerability management

Qualys Has a Prescription for Better Cybersecurity

One of the first things I saw when I arrived in Las Vegas for Black Hat—aside from the flashing lights of the banks of slot machines and the large neon “Welcome to Las Vegas” sign in the airport terminal—was an ad on the wall fo… Continue reading Qualys Has a Prescription for Better Cybersecurity

August 2019 Patch Tuesday: Microsoft plugs critical wormable RDP holes

It’s that time of the month again: Microsoft, Adobe and Intel have pushed out fixes for a bucketload of security issues in their various software. Microsoft’s security updates should take precedence, though, as they fix 29 critical vulnerab… Continue reading August 2019 Patch Tuesday: Microsoft plugs critical wormable RDP holes