Qualys

Results: 208



#Item
91Identity management / Identity management systems / Spamming / Federated identity / Email / Security Assertion Markup Language / Phishing / SAML 2.0 / Qualys / Computer security / Computing / System software

Security and Privacy Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

Add to Reading List

Source URL: info.cotap.com

Language: English - Date: 2015-05-24 17:10:19
92Cyberwarfare / Security controls / Consensus audit guidelines / McAfee / Imperva / Information security / Application firewall / Qualys / SecureWorks / Computer network security / Computer security / Computing

S p o n s o r e d W hi t e p a pe rs To get your free vendor-sponsored whitepaper, visit sans.org/tools.php AlienVault USM: A Security Operations Center for the SMB

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-23 06:14:52
93Cross-platform software / C Standard Library / Linux / Vulnerability / Openwall Project / Qualys / GNU C Library / Debian / Patch / Software / Computing / Free software

Linux distrib vendors make patches available for GHOST

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-29 03:27:38
94Cyberwarfare / Security controls / Consensus audit guidelines / McAfee / Imperva / Information security / Application firewall / Qualys / SecureWorks / Computer network security / Computer security / Computing

S p o n s o r e d W hi t e p a pe rs To get your free vendor-sponsored whitepaper, visit sans.org/tools.php AlienVault USM: A Security Operations Center for the SMB

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-23 06:14:52
95Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
96Data security / Data privacy / Computer law / Credit cards / Qualys / Cloud computing / Security information and event management / Information security / Payment Card Industry Data Security Standard / Computer security / Computing / Security

Continuous Security Monitoring Version 1.5

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-26 16:55:26
97Security / Vulnerability / Attack / Qualys / Countermeasure / Risk / Nessus / McAfee / IT risk / Computer security / Computer network security / Cyberwarfare

datasheet Skybox® Risk Control Risk and Vulnerability Management, Attack Simulation, and Patch Optimization

Add to Reading List

Source URL: www.edvance.com.hk

Language: English
98Security / Software testing / Mitre Corporation / Hacking / Common Vulnerabilities and Exposures / Vulnerability / Attack / Qualys / SecurityFocus / Computer security / Cyberwarfare / Computer network security

PERSPECTIVES Managing Vulnerabilities in Networked Systems

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:54:31
99Consensus audit guidelines / Computer security / Security / Computer network security / Qualys

Automating the 20 Critical Security Controls Andrew Wild Qualys Wolfgang Kandek Qualys

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2013-06-03 15:15:39
100Qualys

PDF Document

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
    UPDATE