Articles
  • Continuous monitoring for your perimeter

    Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments – anywhere in the world.

    In this podcast recorded at Black Hat USA 2014, Sumedh Thakar, Chief Product Officer at Qualys, talks about a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems.

  • API security for connecting the enterprise cloud

    In this interview, Don Bergal, COO at Managed Methods, answers questions regarding security around API based connections between an enterprise and the hybrid cloud.

  • A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress

    In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max Planck Institute for Software Systems as well as Zheng Leong Chua and Prateek Saxena at the National University of Singapore to study cyber-attacks against the human-rights Non-Governmental Organization (NGO) representing the Uyghur ethnic minority group living in China and in exile: World Uyghur Congress (WUC).

  • The dangers of backdoor passwords

    In an increasingly connected world, backdoor passwords have large implications on the Internet of Things, the medical world and industrial control systems.

    While you might immediately think these passwords are inserted by a malicious user, this is not always the case.

  • A walk through Black Hat USA 2014

    Here's a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys, Firemon, iBoss, Crowdstrike, Palo Alto Networks, Shape Security, Pwnie Express, IBM Security, Log Rhythm, RSA Security, Threat Track Security, Vormetric, Risk I/O, Firebind, Cylance, Digital Guardian.

Videos      Podcasts



Spotlight

Successful strategies to avoid frequent password changes

Posted on 19 August 2014.  |  After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their passwords. But, there’s a better way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //