Microsoft and Adobe Patch Tuesday, March 2025 Security Update Review
Qualys Security Blog
by Diksha Ojha
1w ago
March 2025 Patch Tuesday is here, and Microsoft has rolled out critical security updates that address multiple vulnerabilities across its product suite. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for March 2025 Microsoft Patch’s Tuesday, March 2025 edition addressed 67 vulnerabilities, including six critical and 51 important severity vulnerabilities ..read more
Visit website
Steps to TruRisk – 1: Shift to Priority-Driven Strategies
Qualys Security Blog
by Anthony Williams
1w ago
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” — Sun Tzu Security and IT teams are drowning in alerts, scrambling to patch everything they can, yet breaches still happen. Not all vulnerabilities pose the same risk. While reducing totals may seem like progress, without clear priorities, security ..read more
Visit website
Qualys & ServiceNow: Automating Risk-Driven Remediation for Container Security
Qualys Security Blog
by Abhishek Singh
1w ago
Introducing the Qualys & ServiceNow Integration Qualys and ServiceNow are redefining container vulnerability management with an integrated approach that streamlines remediation for highly ephemeral containerized workloads. Organizations can now seamlessly detect, prioritize, and remediate vulnerabilities at scale using Qualys’ threat-informed, runtime-aware security intelligence alongside ServiceNow’s enterprise-grade workflow automation. This partnership ensures vulnerabilities in ephemeral, hard-to-track ..read more
Visit website
How Qualys Policy Compliance Helps You Adopt NIST AI RMF 1.0
Qualys Security Blog
by Mohammad Arif Baig
2w ago
Artificial Intelligence (AI) technologies are reshaping industries at an unprecedented pace. But while these technologies present incredible opportunities for innovation, they also pose unique risks. AI systems are no longer just futuristic concepts; they are actively influencing business decisions, customer interactions, and even regulatory landscapes. As AI capabilities grow, so does the need for robust ..read more
Visit website
Independent Analyst Firm: Qualys Recognized as a Leader in Attack Surface Management
Qualys Security Blog
by Pablo Quiroga
3w ago
As the modern attack surface continues to grow in complexity, the need for simplified asset discovery and risk assessment has never been more acute. In 2021, Qualys introduced CyberSecurity Asset Management (CSAM), a visionary ASM offering designed to bolster the customer’s coverage of the attack surface within a risk-based vulnerability management program. As ASM use ..read more
Visit website
Defense Lessons From the Black Basta Ransomware Playbook
Qualys Security Blog
by Saeed Abbasi
3w ago
The cybersecurity world was rocked last week by a massive leak of Black Basta’s internal communications that emerged from the group’s chat logs. Triggered by internal conflicts and a retaliatory data dump following attacks on Russian banks, the exposed records offer a rare glimpse into Black Basta’s tactics, operations, and leadership. We’ve analyzed these newly ..read more
Visit website
Qualys TotalCloud KCS Achieves Red Hat Vulnerability Scanner Certification
Qualys Security Blog
by Abhinav Mishra
3w ago
We’re excited to announce that Qualys TotalCloud Kubernetes and Container Security (KCS) has achieved the Red Hat Vulnerability Scanning Certification, reinforcing our commitment to unbiased, 6-sigma accurate vulnerability detection. By meeting Red Hat’s rigorous security standards, Qualys TotalCloud KCS extends its industry-leading accuracy across Red Hat OpenShift, Quay.io, RHEL, and CoreOS—critical components in modern cloud-native ..read more
Visit website
From Vulnerability Scanning to Risk Management: The Complete VMDR Advantage
Qualys Security Blog
by Russ Sanderlin
3w ago
What if your vulnerability management tool did more than just scan and instead helped you take control of cyber risks across your business? CISA defines “vulnerability management” as the process by which organizations identify, analyze, and manage vulnerabilities in a critical service’s operating environment. Note the emphasis on criticality and on the outcome: managing risk ..read more
Visit website
Streamline Your Security: Automate Compliance Database Assessments with Qualys Cloud Agent
Qualys Security Blog
by Ridhima Bali
1M ago
Compliance audit failures remain a critical challenge for organizations, particularly in database security. According to the 2024 Thales Data Threat Report, nearly 43% of companies failed at least one compliance audit in the past year. This is a significant concern because audit failures correlate strongly with security incidents—organizations that failed audits were ten times more ..read more
Visit website
Securing Dynamic Cloud Environments: Best Practices for Comprehensive Scanning
Qualys Security Blog
by Shrikant Dhanawade
1M ago
As organizations increasingly adopt cloud-native development, the complexity of securing dynamic environments continues to grow. Vulnerability scanning remains a cornerstone of cloud security, enabling organizations to identify and address risks effectively. However, with the increasing prevalence of exploited vulnerabilities, persistent cloud misconfigurations, and exposure to identity leaks, traditional approaches to vulnerability scanning are no longer ..read more
Visit website

Follow Qualys Security Blog on FeedSpot

Continue with Google
Continue with Apple
OR