ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Announcements

Announcements
The First-ever Cybersecurity Women of the Year Awards
The First-ever Cybersecurity Women of the Year Awards

Security Systems News

August 1, 2019

700 Companies Signed Up for this Free IT Asset Inventory Tool on Day #1
700 Companies Signed Up for this Free IT Asset Inventory Tool on Day #1

Computer Business Review

August 1, 2019

Capital One's Huge Hack Highlights Cloud Security Risks
Capital One's Huge Hack Highlights Cloud Security Risks

Colorado Springs Business Journal

July 30, 2019

Qualys Makes IT Asset Discovery and Inventory App Available for free
Qualys Makes IT Asset Discovery and Inventory App Available for free

BetaNews

July 29, 2019

Find Out What’s on Your Network with Free Qualys Global Asset Discovery and Inventory App
Find Out What’s on Your Network with Free Qualys Global Asset Discovery and Inventory App

Techspective

July 29, 2019

Debunking Five Myths in Cloud Security
Debunking Five Myths in Cloud Security

CISO MAG

July 29, 2019

Don't fall into the trap of thinking you're safe and secure in the cloud. It could become a right royal pain in the SaaS
Don't fall into the trap of thinking you're safe and secure in the cloud. It could become a right royal pain in the SaaS

The Register

July 25, 2019

The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards
The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards

Dark Reading

July 25, 2019

SAFE-T; A Progressive Approach To Zero Trust Access
SAFE-T; A Progressive Approach To Zero Trust Access

Security Boulevard

July 23, 2019

Banking, AI and security - how to improve collaboration
Banking, AI and security - how to improve collaboration

SC Magazine UK

July 1, 2019

Women in Security: Women of Influence
Women in Security: Women of Influence

SC Magazine

July 1, 2019

Cloud Security Alliance releases new model to assist cloud computing risk assessment
Cloud Security Alliance releases new model to assist cloud computing risk assessment

Continuity Central

June 26, 2019

5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night
5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night

Security Boulevard

June 26, 2019

What are the top cloud security certifications for 2019?
What are the top cloud security certifications for 2019?

TechTarget

June 26, 2019

Here Is the Secret Behind Getting That Cloud Computing Job
Here Is the Secret Behind Getting That Cloud Computing Job

Analytics Insight

June 22, 2019

Software Defined Perimeter (SDP): The deployment
Software Defined Perimeter (SDP): The deployment

Network World

June 21, 2019

As cloud complexities increase, cybersecurity skills gap worsens
As cloud complexities increase, cybersecurity skills gap worsens

TechTarget

June 21, 2019

Saudi Arabia's NIC obtains star certification in cloud computing
Saudi Arabia's NIC obtains star certification in cloud computing

Saudi Gazette

June 20, 2019

How Federal Agencies Manage Their Risk in the Cloud
How Federal Agencies Manage Their Risk in the Cloud

FedTech Magazine

June 20, 2019

Who's Responsible for a Cloud Breach? It Depends
Who's Responsible for a Cloud Breach? It Depends

Security Boulevard

June 20, 2019