Tag: Qualys
-
QScanner: Linux command-line utility for scanning container images, conducting SCA
QScanner is a Linux command-line utility tailored for scanning container images and performing Software Composition Analysis (SCA). It is …
-
Qualys Enterprise TruRisk Management unifies asset inventory and risk factors
Qualys launched the Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM). The solution enables CISOs and business leaders …
-
Why a strong patch management strategy is essential for reducing business risk
In this Help Net Security interview, Eran Livne, Senior Director of Product Management, Endpoint Remediation at Qualys and Thomas …
-
[2024] 10 Qualys Alternatives That Should Be on Your Shortlist
While Qualys has long been a leader in cloud-based cybersecurity (it launched in 1999), it’s not suitable for …
-
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
Qualys CyberSecurity Asset Management 3.0. Can you explain the key features of Qualys CyberSecurity Asset Management 3.0 and how it differs …
-
Qualys announces trial to help organisations comply with UK NCSC cyber guidance
Qualys is offering free 30-day access to its SaaS TruRisk platform. This move aims to assist organisations in adhering to the UK National …
-
NIST’s NVD has encountered a problem
Whether the cause is insurmountable technical debt, lack of funds, a third reason or all of them, NIST’s National Vulnerability Database …
-
Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps
Qualys TotalCloud 2.0 provides a unified platform to identify and consolidate all cloud data across diverse multi-cloud environments, …
-
Qualys enhances CyberSecurity Asset Management to discover risky unmanaged devices
Qualys is expanding Qualys CyberSecurity Asset Management (CSAM) to identify unmanaged and untrusted devices in real-time. Leveraging the …
-
Qualys expands partnership with Orange Cyberdefense to optimize vulnerability management activities
Orange Cyberdefense. This expansion signifies that Qualys’ capabilities such as Vulnerability Management, Detection and Response (VMDR) …
-
‘Looney Tunables’ Linux vulnerability could allow threat actors to run malicious code
A newly discovered high-severity Linux vulnerability that has been present on many Linux distributions for at least two years could allow …
-
Old vulnerabilities are still a big problem
A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities …
●●●