Qualys Introduces VMDR: Vulnerability Management, Detection, and Response

Qualys is a sponsor of TechSpective Qualys customers and executives are gathered in Las Vegas this week for the annual Qualys Security Conference. The event officially kicks off with an opening keynote on Wednesday morning, but Qualys wanted to get the party started a little early with the announcement of ... Read More

Fortress Information Security Strives to Help Protect Critical Infrastructure

The agencies and businesses that make up the backbone of our critical infrastructure have a larger bullseye on their backs than an average company. When it comes to the electric utility providers that manage the power grid, the exposure to risk is exacerbated by the fact that much of the ... Read More
PAM

Time Is Money—Poor PAM Can Cost You Both

Most cyberattacks use valid credentials one way or another. Whether it’s an actual insider attack from a disgruntled employee or an external attack using hacked or stolen credentials, at the point of access to sensitive systems or data, the attack appears to be legitimate activity at face value. That is ... Read More
Security Boulevard
Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys is a sponsor of TechSpective There has been an increased focus this year on asset inventory and the idea that you can’t have effective cybersecurity if you don’t even have an accurate picture of the devices and applications in your environment. That’s true for organizations of any size and ... Read More
Context Is King When It Comes to Effective Data Protection

Context Is King When It Comes to Effective Data Protection

Armorblox is a sponsor of TechSpective Data protection is simultaneously one of the most crucial and one of the most challenging goals of cybersecurity. When push comes to shove, all of cybersecurity essentially boils down to protecting data in some way. Judging by the frequency of massive data breaches, and ... Read More
Survey Finds Many SOCs are Set Up to Fail

Survey Finds Many SOCs are Set Up to Fail

Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals monitoring the network around the clock to proactively identify issues and quickly respond to security incidents in real time? Unfortunately, ... Read More
OTCSA Launches to Improve Cybersecurity for OT and Critical Infrastructure

OTCSA Launches to Improve Cybersecurity for OT and Critical Infrastructure

Cybersecurity is a significant challenge for companies of all sizes and across all industries around the world. As challenging as cybersecurity can be with modern or cutting-edge technology, it is often harder to secure and protect legacy hardware and software—the devices and applications that drive manufacturing and form the backbone ... Read More

Ryan Berg Chats about How to Keep ‘Gum’ Off of Your Cybersecurity ‘Shoe’

Inner Circle Podcast Episode 041 This Inner Circle podcast episode is overdue. I’ll spare you the reasons and excuses for why there is a delay, but I want to frame the conversation because this episode was actually recorded with Ryan a few weeks ago and it references the Black Hat ... Read More
Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective once upon a time doesn’t necessarily mean it is still effective today, or that it will be effective ... Read More
Managing the Chaos of Digital Certificates

Managing the Chaos of Digital Certificates

Qualys is a sponsor of TechSpective Organizations are stuck in the middle when it comes to digital certificates. Certificates are table stakes at this point—a business requirement because customers expect a website to be secure. However, proposed changes to the lifespan and expiration of SSL certificates could make effective management ... Read More