Blog.qualys.com

Reinventing Cybersecurity Asset Management

The starting point of security programs is to know what you have. By combining agent-based and agentless data collection, active scanning to track known assets, passive scanning to identify unknown assets, and APIs for automation, the Qualys CloudSee more

Actived: 2 days ago

URL: https://blog.qualys.com/qualys-insights/2021/05/18/reinventing-asset-management-for-security

Introducing CyberSecurity Asset Management

WebToday we are introducing CyberSecurity Asset Management, which builds on Global AssetView and moves the needle beyond inventory by adding security context …

Category:  Health Go Health

Announcing the Newest Game-Changing Upgrades of Qualys …

WebKey Features of RAP. User-Friendly Options: Find a set of intuitive options to streamline the RAP configuration process, including specific endpoint and tag selection, …

Category:  Health Go Health

Part I: Implementing Effective Cyber Security Metrics That Reduce …

WebData retention standards traditionally state minimum and maximum retention times for specified data types. If you are struggling, consult your Data Classification …

Category:  Health Go Health

Advancing Cybersecurity Management With Qualys Cloud Agent

WebThe enhancements in Agent Version Control and Change Activation Key, along with those discussed in our previous blog post, reinforce Qualys’ position as a …

Category:  Health Go Health

Unified Vulnerability View of Unauthenticated and Agent Scans

WebHere’s How it works: Qualys Cloud Platform: Accept the Agent Correlation Identifier and the Qualys Cloud Platform will merge results from unauthenticated scans …

Category:  Health Go Health

How to Quickly Prioritize Risks with VMDR 2.0 and Orchestrate …

WebA single source of truth for asset inventory enables Cybersecurity and IT teams to optimally automate risk prioritization and response. Qualys VMDR 2.0 with …

Category:  Health Go Health

Qualys Is the Outperformer in the New GigaOm Radar Report for

WebGigaOm has unveiled its third-annual Radar for Continuous Vulnerability Management featuring Qualys. In this Report, GigaOm provides a detailed analysis of …

Category:  Health Go Health

ACSC Essential 8 Cybersecurity Strategies, Maturity Levels, and …

WebOriginally published in 2017 as an evolution of the Australian Signals Directorate’s Strategies to Mitigate Cyber Security Incidents, the Australian Cyber …

Category:  Health Go Health

Automated Discovery and Assessment of PaaS Databases with …

WebIn the last several years, Platform as a Service (PaaS) solutions have evolved and matured. As organizations have focused on digital transformation, there has …

Category:  Health Go Health

Analyzing the REvil Ransomware Attack Qualys Security Blog

WebTechnical Details Initial access. The ransomware was delivered via a malicious update payload sent out to the Kaseya VSA server platform. The REvil gang used a …

Category:  Health Go Health

Award-winning Qualys Vulnerability and

WebHybrid Coverage now includes Robust IBM Mainframe Systems. In summary, to reduce an organization’s attack surface, strengthen its security posture, and meet …

Category:  Health Go Health

Qualys Leadership Update: Moving Forward Together

WebQualys Leadership Update: Moving Forward Together. Today, we announced that Philippe Courtot has resigned from his CEO role. As you may know, …

Category:  Health Go Health

Navigating the EU NIS2 Directive Qualys Security Blog

WebHow Qualys Cybersecurity Solutions Ensure Compliance. The European Union’s revised Network and Information Security (NIS2) Directive is a comprehensive …

Category:  Health Go Health

Qualys Broadens Security Offerings for Oracle Cloud Infrastructure

WebOracle Cloud Compute Infrastructure (OCI) connector gathers asset inventory data from your OCI environment. The connector currently populates the …

Category:  Health Go Health

Qualys Performance Tuning Series: Remove Stale Assets for Best

WebIn the second row, we see the stale asset count. The first widget on this row that is labeled “Asset Not Updated in 6 Months” shows the number of assets not updated …

Category:  Health Go Health

Apache HTTP Server Path Traversal & Remote Code Execution …

WebLooking at the HTTP POST request for RCE, we can understand /bin/sh is the system binary that executes the payload echo;id and print the output of id command …

Category:  Health Go Health

Qualys API Best Practices: KnowledgeBase API

WebThis API Best Practices Series shows how to optimize your API usage starting with the KnowledgeBase API. The accompanying video presents these API best …

Category:  Health Go Health

November 2022 Patch Tuesday

WebMicrosoft Patch Tuesday Summary. Microsoft has fixed 65 new vulnerabilities (aka flaws) in the November 2022 update, including ten (10) vulnerabilities classified as …

Category:  Health Go Health