United Kingdom media coverage.
-
12 November 2025
Enterprise network security blighted by legacy and unpatched systems
CSO
-
4 November 2025
Outsourcing Compliance-as-a-Service
News in the Channel
-
3 November 2025
Put a price on security with Value at Risk
Digitalisation World
-
31 October 2025
Why your SOC needs a ROC
Techzine
-
30 October 2025
Risky decisions – who should make the choice on security
Enterprise Times
-
29 October 2025
PHP Servers and IoT Devices Face Growing Cyber-Attack Risks
Infosecurity Magazine
-
28 October 2025
Applications and the afterlife: how businesses can manage software end of life
IT PRO
-
22 October 2025
Security and AI news from the two weeks beginning 6 October 2025
Enterprise Times
-
17 October 2025
AI Transforms Qualys ETM for Proven Risk Reduction
Enterprise Times
-
16 October 2025
Qualys ROCon 2025: Day 2 - Balancing risks across innovation & compliance
Computerweekly.com/de
-
15 October 2025
Qualys expands ETM security platform with identity security and better insight into threats
Techzine
-
15 October 2025
Qualys, Inc. unveiled powerful new capabilities in Qualys Enterprise TruRisk Management
Global Security Mag
-
15 October 2025
Qualys widens TruRisk platform with agentic AI fabric
Computer Weekly
-
15 October 2025
Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management
Security Boulevard
-
15 October 2025
Qualys Brings Predictive Precision to Cyber Risk in the Agentic AI Era
Enterprise Security Tech
-
9 October 2025
Paul Baird on the "common language" of risk, cyberresilience, and neurodiversity
The Stack
-
8 October 2025
What will it take to solve end-of-life software issues?
Innovation News Network
-
8 October 2025
Windows 10 end of support: Time to go virtual?
Computer Weekly
-
6 October 2025
Security and AI news from the week beginning 29th September 2025
Enterprise Times
-
1 October 2025
Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Infosecurity Magazine
-
1 October 2025
CISOs advised to rethink vulnerability management as exploits sharply rise
CSO
-
28 September 2025
AI in Cybersecurity: New Threats and Proactive Defence Strategies for Businesses
News in the Channel
-
24 September 2025
Cyber security is financial security
AT Magazine
-
22 September 2025
Working with your Board - Are You Proving Your Worth?
SC Media
-
16 September 2025
If They Can Hit A Nuclear Agency, They Can Breach You: What the SharePoint Exploit Means For Your Business
ISMS.online
-
15 September 2025
Fighting fire with fire
News in the Channel
-
15 September 2025
Security and AI news from the week beginning 8 September 2025
Enterprise Times
-
2 September 2025
Cybersecurity frontlines: five digital threats and how to face them
TechInformed
-
1 September 2025
Security news from the week beginning 25 August 2025
Enterprise Times
-
28 August 2025
ScamAgent shows how AI could power the next wave of scam calls
Help Net Security
-
26 August 2025
CISA: Intrusions Exploiting Apple Zero-Day Underway
SC Magazine
-
22 August 2025
DORA: Challenges in Compliance
SC Magazine
-
21 August 2025
Enterprise passwords becoming even easier to steal and abuse
CSO
-
20 August 2025
What to expect from Qualys QSC 2025
ComputerWeekly.com
-
18 August 2025
Practices make perfect - Improving your security management approach
TechRadar
-
13 August 2025
Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
Help Net Security
-
12 August 2025
Iran: What’s the Real Threat to CISOs?
Assured
-
12 August 2025
Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list
ComputerWeekly.com
-
11 August 2025
Security news from the week beginning August 4th 2025
Enterprise Times
-
8 August 2025
Cybersecurity Decrypted #45: Black Hat Hits Vegas, ClickTok Scams Online Shoppers, Chanel Hit By Breach
Expert Insights
-
5 August 2025
Upwind drafts in Nyx for cloud security keyhole surgery
Techzine
-
5 August 2025
Qualys CEO on the Future of Cybersecurity: Risk Over Reaction
Techopedia
-
31 July 2025
Don't take risks with security opportunities
PCR Magazine
-
29 July 2025
Q&A: A risk-based approach to banking security with Qualys
Bobsguide
-
29 July 2025
Cyberattacks target email accounts of senior journalists
Press Gazette
-
29 July 2025
Inside the MoD’s New Cyber Command: Why the Government Initiative Needs to be on CISOs’ Radars
Assured
-
8 July 2025
Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)
Help Net Security
-
8 July 2025
July Patch Tuesday brings over 130 new flaws to address
ComputerWeekly
-
8 July 2025
Patch Tuesday: A wormable bug in a security mechanism and other delights
The Stack
-
27 June 2025
Vulnerability Debt: How Do You Put a Price on What to Fix?
Dark Reading
-
24 June 2025
Why do CISOs evolve the same approach around risk?
The Stack
-
19 June 2025
Balancing risk and security: Rich Seiersen
Security Insights
-
12 June 2025
Smaller organizations nearing cybersecurity breaking point
CSO Online
-
10 June 2025
Why Regulators Are Favouring A Converged Approach To Cyber Resilience
ISMS.online
-
2 June 2025
New Linux Vulnerabilities Expose Password Hashes via Core Dumps
Infosecurity
-
2 June 2025
Linux security flaw gives hackers access to sensitive data
Techzine
-
31 May 2025
Two Linux flaws can lead to the disclosure of sensitive data
Security Affairs
-
29 May 2025
Ransomware, regulation, and risk: Ciaran Martin on what’s next for cyber leadership
TechInformed
-
23 May 2025
‘We’re creating a new category in IT security’: Qualys MD EMEA on channel involvement
CRN
-
22 May 2025
Qualys: How VAR Fits Into Risk Management
SC Magazine
-
20 May 2025
How to balance cybersecurity and innovation at an acceptable risk
Techzine
-
20 May 2025
Why internal and external data needs to be assessed for your cyber risk strategy
Data Centre Review
-
15 May 2025
PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
Infosecurity
-
12 May 2025
Qualys MSPs join its mROC Partner Alliance
Enterprise Times
-
7 May 2025
Banking on security with IDB Bank
TechInformed
-
7 May 2025
Why is a Risk Operations Centre important for an MSP
Enterprise Times
-
7 May 2025
Qualys signs partners to its risk operations centre framework
IT Europa
-
29 April 2025
The 3Q sandwich: Strategies for improving risk and security operations
Machine
-
29 April 2025
Qualys expands TotalAI to shore up AI & LLM model risk
ComputerWeekly.com
-
25 April 2025
Qualys unveils Policy Audit to improve compliance
Enterprise Times
-
25 April 2025
Security news from the week beginning 21st April 2025
Enterprise Times
-
24 April 2025
New Qualys tool aims to streamline enterprise compliance audits
BetaNews
-
23 April 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
ComputerWeekly.com
-
17 April 2025
CVSS 10 bug allows pre-auth access to Erlang/OTP SSH servers, host devices
The Stack
-
14 April 2025
TubbTalk 179: Risk and the ROC Solution: What to Know for Growth
Tubblog
-
4 April 2025
Qualys exposes cloud and SaaS risks
ComputerWeekly
-
28 March 2025
Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions
ITPro
-
26 March 2025
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
ITPro
-
24 March 2025
Rethinking risk -- are you taking the right path around security?
BetaNews
-
5 March 2025
Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
Cloud Native Now
-
24 February 2025
Public sector IT projects: stupendous incompetence or bad luck?
ComputerWeekly
-
19 February 2025
Informing and empowering: the role for risk data in cyber security decision making
Resilience Forward
-
18 February 2025
OpenSSH Flaws Expose Systems to Critical Attacks
Infosecurity
-
18 February 2025
FreSSH bugs undiscovered for years threaten OpenSSH security
The Register
-
18 February 2025
OpenSSH vulnerable to man-in-the-middle and DoS attacks
computing.co.uk
-
18 February 2025
Managing cyber risk: It’s the context, stupid
computing.co.uk
-
13 February 2025
CISA and FBI Warn Against Buffer Overflow Vulnerabilities
Infosecurity
-
13 February 2025
Attackers Using Buffer Overflow Flaws More Often, U.S. Agencies Warn
SC Magazine
-
13 February 2025
CISA, FBI Warn of Threats Exploiting Buffer Overflow Vulnerabilities
Security Buzz
-
12 February 2025
UK monitoring group to classify cyber incidents on earthquake-like scale
CSO
-
12 February 2025
Microsoft Fixes Another Two Actively Exploited Zero-Days
Infosecurity
-
3 February 2025
Qualys TotalAppSec addresses API risks
Techzine
-
30 January 2025
The Top Software Weaknesses of 2024, and What to Do About Them
Assured
-
28 January 2025
Windows 10 Is Nearing End of Life, So What Should CISOs Do?
Assured
-
27 January 2025
Centralize your risk response – the need for a Risk Operations Center
TechRadar
-
23 January 2025
Effective Techniques to Refocus on Security Posture
Architecture&Governance
-
22 January 2025
Qualys uncovers large-scale Murdoc Botnet campaign
Computing
-
22 January 2025
Mirai variant Murdoc_Botnet targets cameras and routers
Techzine
-
21 January 2025
New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers
Infosecurity
-
15 January 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
ComputerWeekly.com
-
15 January 2025
Three Hyper-V bugs exploited? Patch Tuesday is back with a bang. Take a breath...
The Stack
-
6 January 2025
What does risk mean to you?
Digitalisation World
-
6 January 2025
Is 2025 the year of (less cloud) on-premises IT?
Techzine