Qualys

Results: 208



#Item
161Electronic commerce / Internet standards / Secure communication / Transport Layer Security / CA/Browser Forum / Public key certificate / Certificate authority / Public key infrastructure / Dynamic SSL / Cryptography / Key management / Public-key cryptography

Microsoft PowerPoint - Qualys SSL Labs - State of SSL - InfoSec World 2011.pptx

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:28
162Software testing / Computer network security / Hacking / Web application security scanner / Qualys / Vulnerability / Full body scanner / Cross-site scripting / Port scanner / Computer security / Cyberwarfare / Computing

Analyzing the Accuracy and Time Costs of Web Application Security Scanners By Larry Suto Application Security Consultant San Francisco February, 2010

Add to Reading List

Source URL: ha.ckers.org

Language: English - Date: 2012-03-13 11:04:50
163Distributed computing / Software distribution / Cloud computing / Software as a service / Software industry / Data center / Internet security / Penetration test / Qualys / Computing / Concurrent computing / Computer network security

Tech Briefing December[removed]v7 Final.pptx

Add to Reading List

Source URL: treasurystrategies.com

Language: English - Date: 2014-12-15 08:26:25
164Data security / Data privacy / Electronic commerce / McAfee / Payment Card Industry Data Security Standard / Qualys / Vulnerability / Risk and compliance / Security controls / Computer security / Cyberwarfare / Security

BUYER CASE STUDY Fashion Retailer Employs McAfee Risk Advisor to Automate Compliance and Risk Management Requirements Vivian Tero Global Headquarters: 5 Speen Street Framingham, MA[removed]USA

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-02-04 04:33:06
165Qualys / Business / Blackbaud / Backup / Internap

Beyond Nines Launches MyArchive Service for Custom Data Archiving Needs For customers with longer-term back-up requirements for their data or specific use cases to satisfy auditors, Beyond Nines now offers the option of

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-05-05 07:00:08
166

Session Description D3 2015 SCADA Security Challenges and Mitigation Amol Sarwate, Director of Vulnerability Labs, Qualys Inc. Technical level: Medium  

Add to Reading List

Source URL: www.infosec-world.com

- Date: 2014-09-03 13:06:52
    167Computer security / Computer network security / Spyware / Qualys / Bookmark / Academic degree / Espionage / Computing / Global Information Assurance Certification

    Browser Maintenance Toolkit Russell Eubanks July 2011 GIAC GSEC, GCIA, GCIH, GPEN, GWAPT, GISP

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2012-08-27 12:08:53
    168Electronic commerce / Secure communication / Cryptographic protocols / Transport Layer Security / Qualys / Man-in-the-middle attack / Certificate authority / Moxie Marlinspike / Public key certificate / Cryptography / Public-key cryptography / Key management

    Breaking SSL: Why Leave to Others What You Can Do Yourself? Breaking SSL Why leave to others what you can do yourself? By Ivan Ristic

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:42:19
    169Public-key cryptography / Computer security / Public key certificate / Qualys / Internet standards / Man-in-the-middle attack / Application firewall / Cryptography / Electronic commerce / Key management

    Internet SSL Survey 2010! Black Hat USA 2010 Ivan Ristic Director of Engineering, Web Application Firewall and SSL [removed] / @ivanristic

    Add to Reading List

    Source URL: blog.ivanristic.com

    Language: English - Date: 2013-02-15 05:44:27
    170Qualys / Application security

    SC Magazine WAS Ad_prefinal_V2

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 18:45:03
    UPDATE