Blog Posts Tagged with "Qualys"

6429389c5e8a4c9555be876f8484331a

Guide: A Vulnerability Management Buyer's Checklist

September 07, 2011 Added by:Sasha Nunke

Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities. Qualys provides this free 12-point guide that will help you determine what will work best for your organization...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Guide: How to Pass an IT Audit

September 01, 2011 Added by:Sasha Nunke

The purpose of this document is to pass along tips we learned that may be useful as you consider adopting QualysGuard PC. This guide covers the steps and procedures to passing an IT GRC audit — as told by an enterprise end-user who deployed QualysGuard Policy Compliance...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Avoiding 7 Common Mistakes of IT Security Compliance

August 16, 2011 Added by:Sasha Nunke

Ambiguity abounds due to lack of a universal philosophy of compliance. A big challenge for security professionals is navigating this ambiguity, especially when financial auditing terms such as GRC are loosely applied to IT security solutions. Let the buyer beware...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Interview Lineup for Black Hat in Las Vegas

August 02, 2011 Added by:Anthony M. Freed

While this is a working trip with little leisure time, I do get to enjoy a fabulous view from my hotel room here at Caesars Palace, compliments of the Black Hat event organizers and the wonderful folks over at Qualys - one of the event's premier sponsors. The video interview lineup is as follows...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Webcast: The State of SSL on the Internet

June 20, 2011 Added by:Sasha Nunke

The SSL (TLS) protocol is the security backbone of the Internet, but surprisingly little is known about how it is deployed. This session will present the results of the first publicly available survey aimed at assessing the state of SSL. It will also provide documentation and free tools...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Qualys Receives Highest Rating in Gartner Report

May 04, 2011 Added by:Headlines

Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Web Application Security: Minimizing the Risk of Attacks

April 19, 2011 Added by:Sasha Nunke

Vulnerabilities in web applications are now the largest source of enterprise security attacks. Web application vulnerabilities accounted for over 55% of all vulnerabilities disclosed in 2010, according to an IBM X-Force study. That may be the tip of the iceberg...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Web Application Security for Dummies

March 09, 2011 Added by:Sasha Nunke

Web application security may seem like a complex, daunting task. This book is a quick guide to understanding how to make your website secure. It surveys the best steps for establishing a regular program to quickly find vulnerabilities in your site with a web application scanner...

Comments  (0)