In this second installment of our GDPR compliance series, we’ll explain the importance of vulnerability management and threat prioritization, and how Qualys can help you solidify these practices so you can slash your risk of data breaches.
Today we begin a blog series in which we’ll highlight how Qualys can assist you by solidifying the security and compliance foundations of your organization, thus slashing your risk of data breaches that could put you in non-compliance with GDPR.
In this blog post, we outline the main difficulties of public cloud security, and explain how Qualys can help you improve your security posture in these environments as part of your GDPR compliance preparedness.
In this ongoing blog series on preparing for complying with the EU’s General Data Protection Regulation (GDPR), we’ll discuss how Indication of Compromise (IOC) can help organizations stay on the right side of GDPR.
File integrity monitoring, like other foundational security practices such as vulnerability management, helps organizations comply with the EU’s General Data Protection Regulation (GDPR) by providing security controls in three key areas. In this blog post, we explain what those are, and how the Qualys File Integrity Monitoring cloud app can help organizations in this respect.
With the EU’s General Data Protection Regulation (GDPR) going into effect in late May, organizations are hungry for clarifying information regarding its vaguely-worded requirements, in particular as they apply to cyber security and IT compliance. This interest in better understanding how to comply with GDPR was evident among participants of a recent Qualys webcast titled “The GDPR deadline readiness and impact to global organizations outside the EU.” Here we’re providing an edited transcript of their questions and of the answers provided by webcast host and Qualys Director of Product Management Tim White.
The General Data Protection Regulation (GDPR) goes into effect in under three months, so the countdown clock is fast approaching zero for organizations worldwide that handle personal data of EU residents. In a recent webcast, Qualys Product Management Director Tim White provided tips and best practices for compliance, and explained how Qualys can help.
With web and mobile apps becoming a preferred vector for data breaches, organizations must include application security in their plans for complying with the EU’s General Data Protection Regulation (GDPR.) In this blog post, we outline a series of risks and best practices culled from the non-profit Open Web Application Security Project (OWASP)’s OWASP Top 10 Privacy Risks Project and OWASP Top 10 Application Security Risks, and we explain how Qualys can help organizations slash their risk of data breaches caused by web app hacks.
The Qualys blog series on GDPR preparedness continues with this installment focused on another core component for meeting the regulation’s requirements: policy compliance.
In this blog post, Qualys continues its series on preparing for the European Union’s General Data Protection Regulation (GDPR) by diving into the topic of vulnerability management and its importance for staying compliant with this regulation, which goes into effect in May 2018.