vulnerability management

Key elements for successfully prioritizing vulnerability remediation
New vulnerabilities are disclosed every day, amounting to thousands per year. Naturally, not all vulnerabilities are created equal. In this podcast recorded at Black Hat USA …

Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …

Vulnerability management trends in Asia Pacific
A new study conducted by Forrester Consulting evaluated perceived challenges, drivers and benefits of various vulnerability management strategies and investments based on …

Qualys releases app for ServiceNow Configuration Management Database
Qualys announced it has received certification of its application with ServiceNow. The Qualys App for ServiceNow CMDB is an application that synchronizes Qualys IT asset …

Minimize your organization’s threat exposure with Qualys ThreatPROTECT
At RSA Conference 2016, Qualys announced the Qualys ThreatPROTECT solution. Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and …
The value in vulnerability management platforms
A study conducted by Forrester Consulting assessed IT decision makers’ satisfaction with their current vulnerability management platforms and the challenges companies …
Cloud-based vulnerability management: Top vendors in the field
With an increasingly fast-paced threat landscape threatening even the most complex network security infrastructures, vulnerability management has become essential.Many vendors …