ETM Identity Resources and Insights in Blogs
In this section, you can find curated articles that help you better understand and get the most value from ETM Identity.
Top 5 Qualys Blogs
This section highlights new ideas in security, such as measuring identity risks, employing AI for security operations, enhancing attack detection, and creating improved user experiences to enable quicker decision-making. These advancements demonstrate how current security programs evolve to focus on risks, allowing organizations to effectively prioritize threats, assess their exploitability, and align cybersecurity efforts with real business needs.
Qualys ETM Identity — The First True Quantification of the Identity Perimeter
This blog introduces Qualys ETM Identity, a new approach to identity security that consolidates fragmented identity signals into a measurable risk model.
The Future of Cybersecurity Risk Management with Qualys TruRisk™ and ROC
This blog introduces the concept of the Risk Operations Center (ROC) as the next evolution in cybersecurity risk management, addressing the growing complexity of fragmented security tools and the overwhelming volume of risk signals.
Bringing the Power of Agentic AI for IdentityRisk, Adaptive Threat Prioritization, and Exposure Exploitability Validation
This blog explores how Qualys integrates agentic AI into its Enterprise TruRisk™ Management platform to enhance cyber risk operations. It introduces capabilities such as ETM Identity, TruLens, and TruConfirm, which collectively enable intelligent threat prioritization, real-time risk assessment, and validation of exploitability helping organizations focus on the vulnerabilities that truly matter.
Active Directory Attacks Demystified: Pass-the-Hash (PtH), Pass-the-Ticket (PtT), and Beyond
This post focuses on detecting and mitigating advanced identity-based attacks such as Pass-the-Hash and Pass-the-Ticket. It outlines how Qualys ETM Identity provides continuous visibility into identity risks, maps attack paths, and enables proactive defense strategies through automated detection, privilege analysis, and exploitability validation.
Cloud Agent in 2025: A Year of Scale, Security, and Smarter Visibility
This blog highlights recent enhancements to the Qualys ETM platform, focusing on an improved user interface designed to accelerate risk-based decision-making. The update emphasizes better visualization, streamlined workflows, and faster access to prioritized risk insights, enabling security teams to act more efficiently on critical exposures.