by Mirko Zorz - Editor in Chief - Wednesday, 13 May 2014.
In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter and the new QualysGuard Continuous Monitoring solution, which can scan the entire perimeter of even large global networks on a frequent basis and report any rules violations as email alerts or to the company's SIEM.
Press the play button below to listen to the podcast:
Continuous Monitoring gives you a hackers-eye view of your perimeter systems – from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.
Posted on 23 October 2014. | Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.
Posted on 22 October 2014. | A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.
Posted on 21 October 2014. | Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.