Qualys Extends EDR Beyond Endpoint with Multi-Vector EDR

Qualys Extends EDR Beyond Endpoint with Multi-Vector EDR

Qualys is a sponsor of TechSpective The endpoint is the front line in the battle between organizations and cyber attackers. EDR (Endpoint Detection and Response) has emerged in recent years as an ...

Cyber Crime Increases as Networks Grow More Vulnerable in the Wake of COVID-19

By Maribeth Anderson and Emily Selck Cyber criminals are capitalizing on the current pandemic and finding greater success in breaching an increasing number of business networks. Safeguard your network during this unprecedented ...
corporate security

Security in Today’s Global Remote Workforce Era

Here are four ways security teams can support a sudden and large remote workforce Security measures put in place across global organizations historically have not been one of the top three priority ...
Security Boulevard
Webroot

Untangle Extends Security Alliance With Webroot

Untangle has deepened its alliance with Webroot to provide tighter integration between the control plane Untangle uses to manage firewalls and the endpoint security software provided by Webroot. Heather Paunet, vice president ...
Security Boulevard
Qualys DevOps Chats

DevOps Chats: Free Remote Endpoint Protection From Qualys

Many companies are responding to the large number of people working from home as a result of the public health situation. Qualys has rolled out a totally free 60-day version of its ...
Security Boulevard
remote working

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace Analytics showed that even before the coronavirus forced ...
Security Boulevard

Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

My guest for this episode is Fabian Wosar, CTO of Emsisoft. Emsisoft is a New Zealand-based maker of antimalware and endpoint security solutions that has established itself as a leader in the ...
Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective ...

HP Moves to Increase Desktop and Printer Security Lead with Bromium

HP just announced the acquisition of Bromium, a unique small security company. I must admit the name “Bromium” kind of sounds like something you’d take if you had a stomach problem, but ...

Evaluating Elements of an Effective Endpoint Security Strategy

One in every four organizations is looking to refine their endpoint security strategy in the next 12-18 months, according to a recent survey by ESG. This desire for change is surprising in ...