previous arrow
next arrow
Slider

Blog

By TONY BRADLEY

Qualys hosted its Qualys Security Conference 19 this week in Las Vegas. Hundreds of attendees from around the world have gathered at the Bellagio hotel to learn more about the current state of cybersecurity and what the future has in store. As you might expect, given the technology landscape today, many of the

By Debjani Chaudhury

Data breaches are here to stay. As per recent research from Bitdefender, 60% of businesses have faced a data breach in the last three years; the numbers show no sign of abating. Even as enterprises continue to embrace innovative technologies, the threat landscape and capabilities of attackers continue to grow

By Jalal Bouhdada

To tackle cyber risks in healthcare, the European Union will introduce a tightened system of rules for medical equipment in 2020. The Medical Device Regulation will assure purchasers for healthcare institutions that any new equipment meets strict cybersecurity requirements, and reduces the chance of hackers breaking into pacemakers, MRIs or

By Vivek Kumar

These days the Internet of Things (IoT) is multiplying at a rapid pace as more connected devices are hitting the consumer, commercial, and industrial markets. However, this proliferation has also created a new ground for cyber criminals seeking actively to compromise IoT devices with injecting malware. Considering a report, almost

By Jessica Groopman

The rise of mobile ushered in a new era of cybersecurity threats and altered the nature of endpoint security. Whereas enterprises typically managed traditional endpoints, such as laptops, today’s system admin of mobile is the end user. But even this shift in user and technical composition pales in comparison to

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.