Please turn on your JavaScript for this page to function normally.

vulnerability management

firefighters
Number of disclosed vulnerabilities reaches all time high in 2016

A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based …

puzzle
Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

Qualys remediate
Key elements for successfully prioritizing vulnerability remediation

New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

threat hunting
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge

Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

World map
Vulnerability management trends in Asia Pacific

A new study conducted by Forrester Consulting evaluated perceived challenges, drivers and benefits of various vulnerability management strategies and investments based on …

analytics IT assets
Qualys releases app for ServiceNow Configuration Management Database

Qualys announced it has received certification of its application with ServiceNow. The Qualys App for ServiceNow CMDB is an application that synchronizes Qualys IT asset …

Qualys ThreatProtect
Minimize your organization’s threat exposure with Qualys ThreatPROTECT

At RSA Conference 2016, Qualys announced the Qualys ThreatPROTECT solution. Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and …

The value in vulnerability management platforms

A study conducted by Forrester Consulting assessed IT decision makers’ satisfaction with their current vulnerability management platforms and the challenges companies …

Cloud-based vulnerability management: Top vendors in the field

With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential.Many vendors …

Don't miss

Cybersecurity news