公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [QSC24: Securing Your Supply Chain & Custom Apps | Open-Source Risks & Threat Management]
In this session, Himanshu Kathpal, Sr. Director of Product Management at Qualys, and Theo Bowman, Information Security Engineer II at NCR Atleos, unpack the growing risks linked to open-source software and supply chain vulnerabilities.
With recent high-profile breaches like Log4j and SolarWinds making headlines, it's clear that traditional vulnerability management tools often miss deeply embedded threats in custom business applications and third-party components.
The session explores how Qualys Software Composition Analysis (SCA) helps organizations detect, prioritize, and remediate hidden risks in real time—before attackers can exploit them. You’ll also hear a firsthand account from NCR Atleos on implementing a proactive risk management strategy, and see a live demo of software risk detection and remediation in action.
Have questions or need help? Reach out to us at sales@qualys.com
Key Insights:
🔹92% of organizations use open-source software, but 48% of codebases contain high-risk vulnerabilities.
🔹15% of data breaches in 2024 were linked to supply chain risks – a 68% increase from last year!
🔹Attackers are evolving, and traditional security tools often miss deeply embedded risks.
_________________________________
Follow Qualys Online:
X - https://x.com/qualys
Linkedin - https://www.linkedin.com/company/qualys
Youtube - https://www.youtube.com/@Qualys
Vimeo - https://www.vimeo.com/qualys
Website - https://www.qualys.com/
_________________________________
#CyberSecurity #SupplyChainRisk #OpenSourceSecurity #Log4j #ThreatDetection #RiskManagement #Qualys #AppSecurity #CyberThreats #VulnerabilityManagement
144
3