by Mirko Zorz - Editor in Chief - Wednesday, 13 May 2014.
In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter and the new QualysGuard Continuous Monitoring solution, which can scan the entire perimeter of even large global networks on a frequent basis and report any rules violations as email alerts or to the company's SIEM.
Press the play button below to listen to the podcast:
Continuous Monitoring gives you a hackers-eye view of your perimeter systems – from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.
Posted on 29 September 2014. | As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it opens.
Posted on 25 September 2014. | In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we're using the cloud. e also talks about how the power of the cloud influences the agility of a modern security architecture.
Posted on 24 September 2014. | Taking a step back is very useful because, even though we work very hard, we need to ask ourselves if we’re making things fundamentally better. In other words, are we focusing our efforts on the right problems?
Posted on 23 September 2014. | A continuing trend of DDoS attacks are short in duration and repeated frequently. In parallel, high-volume and high-rate DDoS attacks were on the upswing in the first half of 2014, according to NSFOCUS.
Posted on 22 September 2014. | In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.