Zephyrnet Logo

Tag: Qualys

Security Information and Event Management (SIEM) – A Detailed Explanation

Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In the agent-based approach, a log pushing agent is...

Defensive Strategies and Qualys VMDR – PSW #649

The crew talks about how to accomplish asset management, vulnerability management, prioritization of remediation, and the actual remediation steps! No small task!...

Phishing’s Effect on Corporate Culture – Terry McCorkle – ESW #179

Many organizations today know about phishing and have taken steps to educate users, followed by phishing simulations. What comes next? This discussion...

Hospital Hackers, $500K Zoom 0day, & SFO Windows Hackers – PSW #647

This week in the Security News, How to teach your iPhone to recognize you while wearing a mask, Hackers Targeting Critical Healthcare...

Pen Testing to Validate Vulnerability Scanners – Magno Gomes – PSW #647

Many people inaccurately use vulnerability scans or vulnerability assessments as terms that are synonymous with penetration tests. Those that do know the...

Tales From The Crypt…Analyst – Part 2 – Jeff Man – PSW #646

In the second part of our interview series with the legend Jeff Man, he continues his discussion with Paul, Matt, and Lee,...

To Hunt or Not To Hunt; This is Never a !=? – Tyler Robinson – PSW #646

We welcome Security Weekly’s own Tyler Robinson for a Technical Segment, to talk about using offensive tooling to obtain OSINT and Real-Time...

Zoom, Kubernetes, and Hacking – PSW #646

A little about Zoom vulnerabilities and data leaks and Cisco Webex vulnerabilities. We talk about security Kubernetes and how the same security...

CMMC – Part 1 – Chris Golden – SCW #23

Chris Golden, Board Member for the Accreditation Body, will answer questions surrounding the DOD’s release of the CMMC program to keep the...

3 Tips, 4 Behaviors, and 15 Steps for Remote Work – BSW #168

In the leadership and communications section, 4 Behaviors That Help Leaders Manage a Crisis, The Right Way to Keep Your Remote Team...

You’re (probably) Doing AppSec Wrong – Grant Ongers – ASW #102

Most security programs generally get in the way of delivery (if they don’t, to all intents and purposes, prevent it altogether) and...

Collaboration Between NetOps and SecOps in Today’s World – Matt Allen – PSW #645

Matt and the Security Weekly crew will discuss how the interaction between network engineers and security operations has changed over the years,...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?