The Power of Remediating Vulnerabilities in Real-Time

Qualys is a sponsor of TechSpective Zero day exploits make for dramatic headlines, but the reality is that most cyberattacks—particularly the ones responsible for the biggest and most infamous data breaches—tend to ...
Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys Brings Global IT Asset Discovery and Inventory App to Federal Government

Qualys is a sponsor of TechSpective There has been an increased focus this year on asset inventory and the idea that you can’t have effective cybersecurity if you don’t even have an ...
Mac Security Blog Infographic Osquery Background BLOG

[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...

Detecting Malicious Packages in Repositories like PyPI: Using Osquery for Complete Software Inventory

Many systems make installing 3rd party software incredibly convenient; from packaging systems and well loved Linux distribution tools like Debian Apt to app stores and per-language repositories. Users are also often allowed ...
NetworkMiner 2.4

NetworkMiner 2.4 Released

We are proud to announce the release of NetworkMiner 2.4 today! The new version comes with several improvements, such as username extraction from Kerberos traffic, better OS fingerprinting and even better Linux ...