Qualys in the news.
Discover what we're up to as the leading provider of network security and compliance solutions.
See what we're up to
Press
Qualys Announces Fourth Quarter and Full Year 2025 Financial Results
February 5, 2026Qualys to Report Fourth Quarter 2025 Financial Results on February 5, 2026
January 22, 2026Qualys Announces Third Quarter 2025 Financial Results
November 4, 2025Qualys Appoints Bradford L. Brooks to its Board of Directors
November 3, 2025Qualys to Report Third Quarter 2025 Financial Results on November 4, 2025
October 21, 2025ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritization, and Exploit Validation
October 15, 2025Qualys Achieves FedRAMP High Authorization for Comprehensive Risk Management Platform
August 27, 2025
Blog
TruConfirm: Autonomous, Agent-Led, Safe Exploit Validation for Real-World Risk Reduction
February 4, 2026Mutagen Astronomy: From Discovery to CISA Recognition—A Seven-Year Journey
February 2, 2026ROC vs. CTEM: How a Risk Operations Center Evolves Beyond Continuous Threat Exposure Management in 2026
January 30, 2026Top 10 Cloud Compliance Tools for Enterprise Security and Audit Readiness in 2026
January 29, 2026How Public Container Registries Have Become a Silent Risk Multiplier in a Modern Supply Chain
January 22, 2026Qualys Named a Leader and Outperformer in the 2025 GigaOm Radar for CNAPP
January 21, 2026Cybersecurity Predictions for 2026 Signal the Maturation of Risk-First Security Models
January 20, 2026
Coverage
Enterprises struggle to control cloud misconfiguration issues. Why?
November 11, 2025 - CSO MagazineOntinue Warns Attackers Are Abusing Nezha Monitoring Tool as Stealthy Remote Access Trojan
December 22, 2025 - SiliconANGLEMonitoring Tool Nezha Abused For Stealthy Post-Exploitation Access
December 22, 2025 - Infosecurity MagazineHackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
December 22, 2025 - HackreadLegitimate Nezha Monitoring Tool Abused as a Powerful RAT, Providing Complete Control Over Compromised Hosts
December 22, 2025 - TechNaduThe Great Cyber Budget Boom: 99% of Leaders Are Increasing Spend
December 18, 2025 - Secure World MagazineReport: AI is Rewriting Software Faster Than It Can Be Secured
December 17, 2025 - SecureWorld
Follow us on social media
