Publications and Resources

Qi and its sister company, Uzado, publish white papers and videos from time to time. Here is a list of publications and resources available for streaming and downloading.

Blue sky home page.jpg

Why compliance does not equal security

It’s an unfortunate fact that sometimes even well-intentioned mistakes can seriously affect your business operations. Here’s an avoidable mistake that happens far too often: assuming that your business is secure simply because you’re compliant with all current regulatory requirements, standards, and best practices.

Make sure you don’t have your priorities backwards: instead of merely concentrating on checking compliance off the list and forgetting about it, you should instead focus on actively maintaining your security. If you’re doing it right, compliance will be a natural byproduct of your efforts.

In this whitepaper we take a look at:

  • Compliance as one part of the journey.

  • A risk-based approach to security.

  • What else you should do to mitigate risk.


Risk-based approach to vulnerability remediation

Many companies have realized that annual vulnerability assessments just aren’t sufficient, and have moved to regular monthly or quarterly vulnerability scanning. While this has helped immensely by providing organizations with a much better understanding of their current security vulnerabilities, it has also created a significant challenge for the people responsible for fixing the vulnerabilities to decide what to fix and when.

This white paper will outline an approach that allows companies to “slice and dice” their vulnerability information in a much more effective fashion, allowing them to decide what to fix and when based on a well-defined methodology that is consistent, repeatable, and contextual for each company that adopts it.

The deliverables of this approach are to more quickly remediate vulnerabilities and to be able to report to the Board that risk is being mitigated in a timely, repeatable manner.

In this whitepaper we take a look at:

  • Why deciding what to fix isn’t easy.

  • Benefits of adopting a risk-based approach.

  • How we can help.

  • Key features of the Uzado platform.

  • How we keep client information secure.


Quick Intelligence Video: Danny Pehar on Breach Readiness

New Canadian privacy breach notification rules, similar to European rules, came into force on November 1, 2018


  • Do you have a breach identification process in place?

  • Do you have a breach tracking and recording system in place?

  • Do you have a breach communication plan in place?

Night sky.jpg