Brian Penn July 26, 2022December 19, 2022 - 4 min read Aflac Reduces Critical Vulnerabilities by 55% with Qualys VMDR 2.0 with TruRisk
Mayank Deshmukh June 29, 2022December 23, 2022 - 10 min read Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134)
Mehul Revankar May 31, 2022December 12, 2022 - 7 min read Transitioning to a Risk-based Approach to Cybersecurity
Swapnil Ahirrao May 6, 2022December 21, 2022 - 7 min read CISA Alert: Top 15 Routinely Exploited Vulnerabilities
Swapnil Ahirrao May 4, 2022December 19, 2022 - 8 min read Ransomware Insights from the FBI’s 2021 Internet Crime Report
Mehul Revankar March 18, 2022December 21, 2022 - 6 min read Qualys Study Reveals How Enterprises Responded to Log4Shell
Nagi Prabhu February 26, 2022December 23, 2022 - 14 min read Russia-Ukraine Crisis: How to Strengthen Your Security Posture to Protect against Cyber Attack, based on CISA Guidelines
Giuseppe Brizio February 15, 2022February 15, 2022 - 6 min read The Unbearable Lightness of Unaudited Supply Chains
Eran Livne January 11, 2022December 23, 2022 - 7 min read How to Make Log4Shell Remediation Quick & Effective
Eran Livne December 28, 2021December 21, 2022 - 8 min read Log4Shell – Follow This Multi-Layered Approach for Detection and Remediation