pic-1

Using Log Parsing to Stop Microsoft IIS Backdoor Attacks

Chances are you’ve heard of Microsoft’s Internet Information Services, (more commonly known as IIS) as it’s one of the most popular web servers in the world, boasting a user base of over ...
time security Log4j

Time for Security With the Open XDR Approach

One nearly universal principle of law, particularly with contracts, is that “time is of the essence.” Increasingly, the adage is becoming a security principle on multiple levels. At the same time, the ...
Security Boulevard
Understanding MDR, XDR, EDR and TDR

Understanding MDR, XDR, EDR and TDR

A program with proper threat detection and response (TDR) has two key pillars: understanding the scope and being proactive in threat hunting. The biggest value of the security operations center (SOC) is ...
Qualys Black Hat Vegas

Black Hat 2022 Trip Report

It felt like I had stepped out of a time machine and it was 2019. I was walking about a mile between meetings on different sides of the Mandalay Bay hotel. Though ...
Security Boulevard

Updated for 2022: What is Network Detection and Response (NDR)? A Beginner’s Guide

Network detection and response, or NDR, has been established as a key tool for companies seeking to improve their threat response. It has become a network security strategy which developed in response ...
🥇

DE:CODED – Firewall speeds and VPN risks

“If they are not getting any money from you, then where are they getting the money from?” Show notes for series 2, episode 2 Is your firewall as fast as you think? ...
5-value-questions-1

5 Questions to ask About Your EDR – Integration

This is the final part in our series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Why are we writing this series? Choosing ...
zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Qualys Adds Risk Assessment to Cloud Security Platform

Qualys, Inc. today updated its vulnerability management, detection and response (VMDR) cloud service to include a risk assessment capability, called TruRisk, that enables cybersecurity teams to better prioritize their remediation efforts. As ...
Security Boulevard
5-value-questions-1

5 Questions to ask About Your EDR – Response

This is part 3 in a series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Choosing the right EDR solution is important, as ...
eer-seo-image

Catch ‘em Deletes – Increasing Visibility, Not the cost

Cyber Adversaries, or malware authors, are motivated to remove the traces of the malware’s execution for a variety of reasons including evading “Defense Mechanisms”, as well as ensuring the malware researchers cant ...