Juan C. Perez January 17, 2017September 6, 2020 - 6 min read Overwhelmed by Security Vulnerabilities? Here’s How to Prioritize
Juan C. Perez January 12, 2017September 6, 2020 - 5 min read Five Things to Know About Qualys’ FedRAMP Authorization
Juan C. Perez January 10, 2017September 6, 2020 - 5 min read Information Security and Compliance: New Year’s Resolutions You Can Keep
Juan C. Perez January 5, 2017September 6, 2020 - 8 min read Office Depot Extends the Value of Cloud-based Security via Qualys APIs
Juan C. Perez December 12, 2016September 6, 2020 - 8 min read SSL: Deceptively Simple, Yet Hard to Implement
Juan C. Perez December 5, 2016September 6, 2020 - 7 min read SANS Survey Report: Organizations’ Continuous Monitoring Programs Must Keep Maturing to Yield Full Benefits
Juan C. Perez November 28, 2016September 7, 2020 - 5 min read Web and Mobile Apps Often Hide Complex Maze of Insecure Connections
Juan C. Perez November 22, 2016September 7, 2020 - 5 min read As Web Apps Become Top Data Breach Vector, Protecting Them is Critical
Juan C. Perez November 21, 2016September 6, 2020 - 5 min read BAI Security Eyes Threat Prioritization as Competitive Differentiator
Juan C. Perez October 27, 2016September 6, 2020 - 4 min read A CSO’s View of Vulnerability Management: “Essential and Core” to Enterprise Security