Patch or Mitigate Dangerous Microsoft Windows CryptoAPI Spoofing Vulnerability ASAP
Qualys is a sponsor of TechSpective Microsoft kicked off the new decade with a bang. Last Tuesday was the first Microsoft Patch Tuesday of 2020, and one of the patches pushed out by Microsoft addresses a dangerous flaw in Crypt32.dll that could allow attackers to spoof signatures on encrypted communications ... Read More
Menlo Security Transcends the Almost Secure Cybersecurity Paradigm
Companies of all sizes, across all industries, and from every region of the world all seem to follow the same basic cybersecurity strategy. That would make sense if it worked, but businesses continue to cling to an outdated model of cybersecurity despite overwhelming evidence that it’s not very effective. There ... Read More
Improving and Automating Threat Intelligence for Better Cybersecurity
Devo is a sponsor of TechSpective Cybersecurity is challenging. It is a daunting exercise to protect a complex hybrid cloud infrastructure from a rapidly evolving and expanding threat landscape. Organizations invest significant time, money and resources to deploy and manage a suite of firewalls, endpoint security, intrusion detection, and other ... Read More
Protecting the ‘Crown Jewels’ with Threat Hunting
Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch efficiently and do a poor job of understanding emerging threats. The threat landscape has shifted and accelerated, and organizations need ... Read More
Qualys Introduces VMDR: Vulnerability Management, Detection, and Response
Qualys is a sponsor of TechSpective Qualys customers and executives are gathered in Las Vegas this week for the annual Qualys Security Conference. The event officially kicks off with an opening keynote on Wednesday morning, but Qualys wanted to get the party started a little early with the announcement of ... Read More
Fortress Information Security Strives to Help Protect Critical Infrastructure
The agencies and businesses that make up the backbone of our critical infrastructure have a larger bullseye on their backs than an average company. When it comes to the electric utility providers that manage the power grid, the exposure to risk is exacerbated by the fact that much of the ... Read More
Time Is Money—Poor PAM Can Cost You Both
Most cyberattacks use valid credentials one way or another. Whether it’s an actual insider attack from a disgruntled employee or an external attack using hacked or stolen credentials, at the point of access to sensitive systems or data, the attack appears to be legitimate activity at face value. That is ... Read More
Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government
Qualys is a sponsor of TechSpective There has been an increased focus this year on asset inventory and the idea that you can’t have effective cybersecurity if you don’t even have an accurate picture of the devices and applications in your environment. That’s true for organizations of any size and ... Read More
Context Is King When It Comes to Effective Data Protection
Armorblox is a sponsor of TechSpective Data protection is simultaneously one of the most crucial and one of the most challenging goals of cybersecurity. When push comes to shove, all of cybersecurity essentially boils down to protecting data in some way. Judging by the frequency of massive data breaches, and ... Read More
Survey Finds Many SOCs are Set Up to Fail
Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals monitoring the network around the clock to proactively identify issues and quickly respond to security incidents in real time? Unfortunately, ... Read More
