Back to qualys.com
4 posts

Black Hat USA 2018 Best Practices Videos

Watch the presentations from the Qualys booth at Black Hat USA 2018, available online now. Learn how your peers are securing their environments and see the breadth and depth of Qualys solutions.

Industry-Leading Best Practices

Qualys customers explain how they run their industry-leading security programs.


Scaling a Vulnerability Management Program While Reducing Network Impact
Josh Oquendo, Threat Intelligence Analyst, Finastra

Continue reading …

Black Hat/DEF CON/B-Sides Las Vegas: Best in Show – part 2

Two weeks ago, our team from Qualys Engineering participated in the Black Hat, B-Sides and DEF CON events in Las Vegas, and presented sessions on Web application security, flaws in Internet attached DVRs and introduced a tool to probe for DoS problems in web applications.

But we were mainly in Las Vegas to attend presentations to see the latest on what is going on in our field and maintain the relationships with other researchers and vendors. We saw a number of excellent presentations, so many that we had to break it up into two parts.

Here is the second pass of our favorites, click here for our first pass:

Continue reading …

Black Hat/DEF CON/B-Sides Las Vegas: Best in Show – part 1

Last week, our team from Qualys Engineering participated in the Black Hat, B-Sides and DEF CON events in Las Vegas, and presented sessions on Web application security, flaws in Internet attached DVRs and introduced a tool to probe for DoS problems in web applications.

But we were mainly in Las Vegas to attend presentations to see the latest on what is going on in our field and maintain the relationships with other researchers and vendors. We saw a number of excellent presentations, here is a quick rundown of our favorites:

Continue reading …

Going to Las Vegas Next Week? Skip the Wi-Fi and Maybe the Apps

Stay Paranoid and Trust No OneI am not a paranoid person and most industry conferences I go to don’t generate any worries about security.  You go and participate, but otherwise operate normally, working, emailing, texting, tweeting. But not at DEF CON, or even its corporate sister event Black Hat, which run next week in Las Vegas.

Those shows together attract the world’s top hackers and security researchers, who share research on the latest threats and attacks. With that many security experts in one spot, it is not uncommon to see some or other groups running cons, attacks and gaming devices, all in good fun, pushing the limits and testing boundaries. And there are also plenty of pranksters.

What does this mean for you, the attendee, exactly? It means that you have to really be vigilant about securing your computer and data when you are there, or you will end up on the famed Wall of Sheep, where usernames and passwords sniffed from the Wi-Fi network are displayed for all to see. Every year, many a security professional has fallen prey to that.

Continue reading …