Search Results: 2010
1-15 of 175 results

Cigna Finds Good Therapy: Builds a More Efficient Risk Management Streamlined Compliance and System Security Program

CIGNA Corporation and its subsidiaries constitute one of the largest publicly owned employee benefits organisations in the US and throughout the...

Published 09 December 2010

eBay, Inc. - Securing the World’s Online Marketplace with QualysGuard

eBay, Inc. is the largest and most popular marketplace on the Internet, allowing members to buy and sell almost anything. Launched in 1995, about...

Published 09 December 2010

EPO Streamlineses Vulnerability Management to Ensure the Confidentiality, Integrity, and Availability of Patent Information

As the European Patent Office grew increasingly reliant on its IT infrastructure to transform how it accepts and manages patent applications, the...

Published 09 December 2010

Global Risk Planning and Financial Services Leader Secures Its External and Internal Networks With At a Glance QualysGuard

The leading worldwide provider of expert advice in risk management and financial planning, AXA Investment Managers protects 50 million individual...

Published 09 December 2010

Oracle Global IT (GIT) Streamlined Security

To further enhance its IT system risk management capabilities, Oracle GIT has deployed an on-demand software vulnerability and compliance...

Published 09 December 2010

Underpinning a Risk-Driven Strategy

Standard Chartered is the world's leading emerging markets bank headquartered in London. It offers both consumer and wholesale banking services....

Published 09 December 2010

71% of UK orgs suffered data breach in last 12 months: survey

But can they reasonably do anything about the risks? Possible fines of up to £500,000 should certainly focus the mind on the issue...

Published 30 November 2010

Average number of malware threats created every day up 63,000 in 2010: Panda Security

Average lifespan of 54% of malware has been reduced to 24 hours

Malware

Published 25 November 2010

Radware unveils newer version of DefensePro for attack prevention

Financial fraud, information theft and malware spread prevention by blocking network attacks

Security

Published 23 November 2010

2010 'Top Cyber Security Risks Report' Highlights Latest Data on Most Significant Security Risks Facing Enterprises

Data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs provides insight on how organisations can protect themselves from cyber...

Published 03 November 2010

Agiliance and Qualys Partner to Provide Security Risk Assessment on Demand

QualysGuard and Agiliance RiskVision Integration offers comprehensive GRC solution for real-time risk management.

Published 03 November 2010

Christophe Bianco Joins Qualys as Vice President and General Manager of EMEA

16 March, 2010 - Qualys®, Inc., the leading provider of on demand IT security risk and compliance management solutions, today announced the...

Published 03 November 2010

Inc. Magazine Names Qualys One of America’s Fastest Growing Private Companies for Fourth Consecutive Year

Qualys ranked 46th in the security industry and 9th among security companies with revenues over $50 million.

Published 03 November 2010

IT Policy Compliance For Dummies

This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After...

Published 03 November 2010

Justifying IT Security - Managing Risk and Keeping Your Network Secure

The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely...

Published 03 November 2010

1-15 of 175 results

Join our network

754 people like this.
0 people follow this.

CBR White Paper Recommendations

  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
  • Responding to the New Information Risk Landscape

    03 November 2010 | By Qualys

    This paper analyses the trends and changing priorities of the emerging information security landscape, setting out a new action agenda for managing future information risks across a volatile and increasingly externalised business environment. ...

    White Papers
  • The Top 10 Reports for Managing Vulnerabilities

    03 November 2010 | By Qualys

    This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organisations are using to reduce risks on their network infrastructure....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.