by Mirko Zorz - Editor in Chief - Thursday, 14 August 2014.
Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments anywhere in the world.
In this podcast recorded at Black Hat USA 2014, Sumedh Thakar, Chief Product Officer at Qualys, talks about a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems.
Continuous Monitoring gives you a hackers-eye view of your perimeter systems from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.
Press the play button below to listen to the podcast:
As Chief Product Officer at Qualys, Sumedh oversees worldwide engineering, development and product management for the QualysGuard software-as-a-service (SaaS) platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering QualysGuard's PCI compliance platform to meet the PCI DSS requirements. Today, more than 69 percent of ASVs and 50 percent of QSAs worldwide use QualysGuard PCI to perform PCI DSS certification.
Posted on 24 November 2014. | Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the cloud.
Posted on 24 November 2014. | Symantec researchers are warning about a new, complex cyber espionage tool that has been around for years and that has likely been created and is wielded by a nation state.
Posted on 21 November 2014. | A new survey revealed that the employers of 40% of those surveyed had suffered a major IT disruption cased by staff visiting questionable and other non-work related web sites with work-issued hardware, resulting in malware infection and other related issues.