Patch or Mitigate Dangerous Microsoft Windows CryptoAPI Spoofing Vulnerability ASAP

Qualys is a sponsor of TechSpective Microsoft kicked off the new decade with a bang. Last Tuesday was the first Microsoft Patch Tuesday of 2020, and one of the patches pushed out by Microsoft addresses a dangerous flaw in Crypt32.dll that could allow attackers to spoof signatures on encrypted communications ... Read More

Menlo Security Transcends the Almost Secure Cybersecurity Paradigm

Companies of all sizes, across all industries, and from every region of the world all seem to follow the same basic cybersecurity strategy. That would make sense if it worked, but businesses continue to cling to an outdated model of cybersecurity despite overwhelming evidence that it’s not very effective. There ... Read More
Improving and Automating Threat Intelligence for Better Cybersecurity

Improving and Automating Threat Intelligence for Better Cybersecurity

Devo is a sponsor of TechSpective Cybersecurity is challenging. It is a daunting exercise to protect a complex hybrid cloud infrastructure from a rapidly evolving and expanding threat landscape. Organizations invest significant time, money and resources to deploy and manage a suite of firewalls, endpoint security, intrusion detection, and other ... Read More
Threat Hunting with Qualys: Going Beyond Your EDR Solutions

Protecting the ‘Crown Jewels’ with Threat Hunting

Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch efficiently and do a poor job of understanding emerging threats. The threat landscape has shifted and accelerated, and organizations need ... Read More

Qualys Introduces VMDR: Vulnerability Management, Detection, and Response

Qualys is a sponsor of TechSpective Qualys customers and executives are gathered in Las Vegas this week for the annual Qualys Security Conference. The event officially kicks off with an opening keynote on Wednesday morning, but Qualys wanted to get the party started a little early with the announcement of ... Read More

Fortress Information Security Strives to Help Protect Critical Infrastructure

The agencies and businesses that make up the backbone of our critical infrastructure have a larger bullseye on their backs than an average company. When it comes to the electric utility providers that manage the power grid, the exposure to risk is exacerbated by the fact that much of the ... Read More
authorization

Time Is Money—Poor PAM Can Cost You Both

Most cyberattacks use valid credentials one way or another. Whether it’s an actual insider attack from a disgruntled employee or an external attack using hacked or stolen credentials, at the point of access to sensitive systems or data, the attack appears to be legitimate activity at face value. That is ... Read More
Security Boulevard
Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys is a sponsor of TechSpective There has been an increased focus this year on asset inventory and the idea that you can’t have effective cybersecurity if you don’t even have an accurate picture of the devices and applications in your environment. That’s true for organizations of any size and ... Read More
Context Is King When It Comes to Effective Data Protection

Context Is King When It Comes to Effective Data Protection

Armorblox is a sponsor of TechSpective Data protection is simultaneously one of the most crucial and one of the most challenging goals of cybersecurity. When push comes to shove, all of cybersecurity essentially boils down to protecting data in some way. Judging by the frequency of massive data breaches, and ... Read More
Survey Finds Many SOCs are Set Up to Fail

Survey Finds Many SOCs are Set Up to Fail

Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals monitoring the network around the clock to proactively identify issues and quickly respond to security incidents in real time? Unfortunately, ... Read More