Please turn on your JavaScript for this page to function normally.
lens
Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the …

tunnel
There are no real shortcuts to most security problems

For Xerox Chief Information Security Officer Dr. Alissa Johnson, human ingenuity, partnerships and automation are the answer to most security problems the company has …

puzzle
Incorporating sensitive asset data into your vulnerability and compliance program

In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating …

magnify
Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …

automate
Securely deploying automation for business benefit

Streamlining business processes – and cutting down on the need for human employees to perform mundane and repetitive tasks – automation technology is increasingly being …

energy
Building a sound security strategy for an energy sector company

As more and more attacks against companies working in the energy sector become public, it is becoming increasingly clear that those systems are far from impermeable. And …

crowd
How SOAR can increase the value of your security team

Over the past few years, the cybersecurity industry has rapidly transformed. The exploding number and growing complexity of cyberattacks has forced organizations to spend …

fingerprint
How the access control market has developed and should direct itself in the coming years

Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …

risk
How third-party risk affects your GDPR compliance

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. …

Vulcan Cyber
Vulcan Cyber announces continuous vulnerability remediation platform and $4M seed round

Israeli startup Vulcan Cyber today announced $4 million in seed funding for its mission to eliminate the vulnerability remediation gap that unnecessarily exposes enterprises …

automate
Automating web app testing to secure your environment

In this podcast recorded at RSA Conference 2018, Dave Ferguson, Director, Product Management for Web Application Security at Qualys, talks about the challenges and benefits of …

Capsule8
How to adopt the mindset of continuous security for security operations

In this podcast recorded at RSA Conference 2018, Dino Dai Zovi, co-founder and CTO at Capsule8, talks about what continuous security is, and how you should bring more of this …

Don't miss

Cybersecurity news