United Kingdom media coverage.

Browse media coverage


Media inquiries

Mark Kember
OneBite PR
+44 0 1635 887 707[email protected]

Global media contacts Arrow Right

26 November 2025

How board members think about cyber risk and what CISOs should tell them

Help Net Security
21 November 2025

Risk yoga - are you as flexible as you think you are?

ITBrief UK
12 November 2025

Enterprise network security blighted by legacy and unpatched systems

CSO
4 November 2025

Outsourcing Compliance-as-a-Service

News in the Channel
3 November 2025

Put a price on security with Value at Risk

Digitalisation World
31 October 2025

Why your SOC needs a ROC

Techzine
30 October 2025

Risky decisions – who should make the choice on security

Enterprise Times
29 October 2025

PHP Servers and IoT Devices Face Growing Cyber-Attack Risks

Infosecurity Magazine
28 October 2025

Applications and the afterlife: how businesses can manage software end of life

IT PRO
22 October 2025

Security and AI news from the two weeks beginning 6 October 2025

Enterprise Times
17 October 2025

AI Transforms Qualys ETM for Proven Risk Reduction

Enterprise Times
15 October 2025

Qualys ROCon 2025: Day 2 - Balancing risks across innovation & compliance

Computerweekly.com/de
14 October 2025

Qualys expands ETM security platform with identity security and better insight into threats

Techzine
14 October 2025

Qualys, Inc. unveiled powerful new capabilities in Qualys Enterprise TruRisk Management

Global Security Mag
14 October 2025

Qualys widens TruRisk platform with agentic AI fabric

Computer Weekly
14 October 2025

Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management

Security Boulevard
14 October 2025

Qualys Brings Predictive Precision to Cyber Risk in the Agentic AI Era

Enterprise Security Tech
8 October 2025

Paul Baird on the "common language" of risk, cyberresilience, and neurodiversity

The Stack
7 October 2025

What will it take to solve end-of-life software issues?

Innovation News Network
7 October 2025

Windows 10 end of support: Time to go virtual?

Computer Weekly
5 October 2025

Security and AI news from the week beginning 29th September 2025

Enterprise Times
30 September 2025

Broadcom Issues Patches for VMware NSX and vCenter Security Flaws

Infosecurity Magazine
30 September 2025

CISOs advised to rethink vulnerability management as exploits sharply rise

CSO
27 September 2025

AI in Cybersecurity: New Threats and Proactive Defence Strategies for Businesses

News in the Channel
23 September 2025

Cyber security is financial security

AT Magazine
21 September 2025

Working with your Board - Are You Proving Your Worth?

SC Media
15 September 2025

If They Can Hit A Nuclear Agency, They Can Breach You: What the SharePoint Exploit Means For Your Business

ISMS.online
14 September 2025

Fighting fire with fire

News in the Channel
14 September 2025

Security and AI news from the week beginning 8 September 2025

Enterprise Times
31 August 2025

Security news from the week beginning 25 August 2025

Enterprise Times
1 September 2025

Cybersecurity frontlines: five digital threats and how to face them

TechInformed
27 August 2025

ScamAgent shows how AI could power the next wave of scam calls

Help Net Security
25 August 2025

CISA: Intrusions Exploiting Apple Zero-Day Underway

SC Magazine
21 August 2025

DORA: Challenges in Compliance

SC Magazine
20 August 2025

Enterprise passwords becoming even easier to steal and abuse

CSO
19 August 2025

What to expect from Qualys QSC 2025

ComputerWeekly.com
17 August 2025

Practices make perfect - Improving your security management approach

TechRadar
12 August 2025

Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)

Help Net Security
11 August 2025

Iran: What’s the Real Threat to CISOs?

Assured
11 August 2025

Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list

ComputerWeekly.com
10 August 2025

Security news from the week beginning August 4th 2025

Enterprise Times
7 August 2025

Cybersecurity Decrypted #45: Black Hat Hits Vegas, ClickTok Scams Online Shoppers, Chanel Hit By Breach

Expert Insights
28 July 2025

Q&A: A risk-based approach to banking security with Qualys

Bobsguide
28 July 2025

Cyberattacks target email accounts of senior journalists

Press Gazette
30 July 2025

Don't take risks with security opportunities

PCR Magazine
4 August 2025

Upwind drafts in Nyx for cloud security keyhole surgery

Techzine
4 August 2025

Qualys CEO on the Future of Cybersecurity: Risk Over Reaction

Techopedia
28 July 2025

Inside the MoD’s New Cyber Command: Why the Government Initiative Needs to be on CISOs’ Radars

Assured
7 July 2025

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)

Help Net Security
7 July 2025

July Patch Tuesday brings over 130 new flaws to address

ComputerWeekly
7 July 2025

Patch Tuesday: A wormable bug in a security mechanism and other delights

The Stack
26 June 2025

Vulnerability Debt: How Do You Put a Price on What to Fix?

Dark Reading
23 June 2025

Why do CISOs evolve the same approach around risk?

The Stack
18 June 2025

Balancing risk and security: Rich Seiersen

Security Insights
11 June 2025

Smaller organizations nearing cybersecurity breaking point

CSO Online
9 June 2025

Why Regulators Are Favouring A Converged Approach To Cyber Resilience

ISMS.online
1 June 2025

New Linux Vulnerabilities Expose Password Hashes via Core Dumps

Infosecurity
1 June 2025

Linux security flaw gives hackers access to sensitive data

Techzine
30 May 2025

Two Linux flaws can lead to the disclosure of sensitive data

Security Affairs
28 May 2025

Ransomware, regulation, and risk: Ciaran Martin on what’s next for cyber leadership

TechInformed
22 May 2025

‘We’re creating a new category in IT security’: Qualys MD EMEA on channel involvement

CRN
21 May 2025

Qualys: How VAR Fits Into Risk Management

SC Magazine
19 May 2025

How to balance cybersecurity and innovation at an acceptable risk

Techzine
19 May 2025

Why internal and external data needs to be assessed for your cyber risk strategy

Data Centre Review
14 May 2025

PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack

Infosecurity
11 May 2025

Qualys MSPs join its mROC Partner Alliance

Enterprise Times
6 May 2025

Banking on security with IDB Bank

TechInformed
6 May 2025

Why is a Risk Operations Centre important for an MSP

Enterprise Times
6 May 2025

Qualys signs partners to its risk operations centre framework

IT Europa
28 April 2025

The 3Q sandwich: Strategies for improving risk and security operations

Machine
28 April 2025

Qualys expands TotalAI to shore up AI & LLM model risk

ComputerWeekly.com
24 April 2025

Qualys unveils Policy Audit to improve compliance

Enterprise Times
24 April 2025

Security news from the week beginning 21st April 2025

Enterprise Times
23 April 2025

New Qualys tool aims to streamline enterprise compliance audits

BetaNews
13 April 2025

TubbTalk 179: Risk and the ROC Solution: What to Know for Growth

Tubblog
22 April 2025

Qualys goes to bat for US cricket side San Francisco Unicorns

ComputerWeekly.com
16 April 2025

CVSS 10 bug allows pre-auth access to Erlang/OTP SSH servers, host devices

The Stack
3 April 2025

Qualys exposes cloud and SaaS risks

ComputerWeekly
27 March 2025

Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions

ITPro
25 March 2025

Open source risks threaten all business users – it’s clear we must get a better understanding of open source software

ITPro
23 March 2025

Rethinking risk -- are you taking the right path around security?

BetaNews
5 March 2025

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps

Cloud Native Now
24 February 2025

Public sector IT projects: stupendous incompetence or bad luck?

ComputerWeekly
19 February 2025

Informing and empowering: the role for risk data in cyber security decision making

Resilience Forward
18 February 2025

OpenSSH Flaws Expose Systems to Critical Attacks

Infosecurity
18 February 2025

FreSSH bugs undiscovered for years threaten OpenSSH security

The Register
18 February 2025

OpenSSH vulnerable to man-in-the-middle and DoS attacks

computing.co.uk
18 February 2025

Managing cyber risk: It’s the context, stupid

computing.co.uk
13 February 2025

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

Infosecurity
13 February 2025

Attackers Using Buffer Overflow Flaws More Often, U.S. Agencies Warn

SC Magazine
13 February 2025

CISA, FBI Warn of Threats Exploiting Buffer Overflow Vulnerabilities

Security Buzz
12 February 2025

UK monitoring group to classify cyber incidents on earthquake-like scale

CSO
12 February 2025

Microsoft Fixes Another Two Actively Exploited Zero-Days

Infosecurity
3 February 2025

Qualys TotalAppSec addresses API risks

Techzine
30 January 2025

The Top Software Weaknesses of 2024, and What to Do About Them

Assured
28 January 2025

Windows 10 Is Nearing End of Life, So What Should CISOs Do?

Assured
27 January 2025

Centralize your risk response – the need for a Risk Operations Center

TechRadar
23 January 2025

Effective Techniques to Refocus on Security Posture

Architecture&Governance
22 January 2025

Qualys uncovers large-scale Murdoc Botnet campaign

Computing
22 January 2025

Mirai variant Murdoc_Botnet targets cameras and routers

Techzine
21 January 2025

New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers

Infosecurity
15 January 2025

Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities

ComputerWeekly.com
15 January 2025

Three Hyper-V bugs exploited? Patch Tuesday is back with a bang. Take a breath...

The Stack
6 January 2025

What does risk mean to you?

Digitalisation World
6 January 2025

Is 2025 the year of (less cloud) on-premises IT?

Techzine

Follow us on social media