United Kingdom media coverage.
26 November 2025
How board members think about cyber risk and what CISOs should tell them
Help Net Security21 November 2025
Risk yoga - are you as flexible as you think you are?
ITBrief UK12 November 2025
Enterprise network security blighted by legacy and unpatched systems
CSO4 November 2025
Outsourcing Compliance-as-a-Service
News in the Channel3 November 2025
Put a price on security with Value at Risk
Digitalisation World31 October 2025
Why your SOC needs a ROC
Techzine30 October 2025
Risky decisions – who should make the choice on security
Enterprise Times29 October 2025
PHP Servers and IoT Devices Face Growing Cyber-Attack Risks
Infosecurity Magazine28 October 2025
Applications and the afterlife: how businesses can manage software end of life
IT PRO22 October 2025
Security and AI news from the two weeks beginning 6 October 2025
Enterprise Times17 October 2025
AI Transforms Qualys ETM for Proven Risk Reduction
Enterprise Times15 October 2025
Qualys ROCon 2025: Day 2 - Balancing risks across innovation & compliance
Computerweekly.com/de14 October 2025
Qualys expands ETM security platform with identity security and better insight into threats
Techzine14 October 2025
Qualys, Inc. unveiled powerful new capabilities in Qualys Enterprise TruRisk Management
Global Security Mag14 October 2025
Qualys widens TruRisk platform with agentic AI fabric
Computer Weekly14 October 2025
Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management
Security Boulevard14 October 2025
Qualys Brings Predictive Precision to Cyber Risk in the Agentic AI Era
Enterprise Security Tech8 October 2025
Paul Baird on the "common language" of risk, cyberresilience, and neurodiversity
The Stack7 October 2025
What will it take to solve end-of-life software issues?
Innovation News Network7 October 2025
Windows 10 end of support: Time to go virtual?
Computer Weekly5 October 2025
Security and AI news from the week beginning 29th September 2025
Enterprise Times30 September 2025
Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
Infosecurity Magazine30 September 2025
CISOs advised to rethink vulnerability management as exploits sharply rise
CSO27 September 2025
AI in Cybersecurity: New Threats and Proactive Defence Strategies for Businesses
News in the Channel23 September 2025
Cyber security is financial security
AT Magazine21 September 2025
Working with your Board - Are You Proving Your Worth?
SC Media15 September 2025
If They Can Hit A Nuclear Agency, They Can Breach You: What the SharePoint Exploit Means For Your Business
ISMS.online14 September 2025
Fighting fire with fire
News in the Channel14 September 2025
Security and AI news from the week beginning 8 September 2025
Enterprise Times31 August 2025
Security news from the week beginning 25 August 2025
Enterprise Times1 September 2025
Cybersecurity frontlines: five digital threats and how to face them
TechInformed27 August 2025
ScamAgent shows how AI could power the next wave of scam calls
Help Net Security25 August 2025
CISA: Intrusions Exploiting Apple Zero-Day Underway
SC Magazine21 August 2025
DORA: Challenges in Compliance
SC Magazine20 August 2025
Enterprise passwords becoming even easier to steal and abuse
CSO19 August 2025
What to expect from Qualys QSC 2025
ComputerWeekly.com17 August 2025
Practices make perfect - Improving your security management approach
TechRadar12 August 2025
Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
Help Net Security11 August 2025
Iran: What’s the Real Threat to CISOs?
Assured11 August 2025
Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list
ComputerWeekly.com10 August 2025
Security news from the week beginning August 4th 2025
Enterprise Times7 August 2025
Cybersecurity Decrypted #45: Black Hat Hits Vegas, ClickTok Scams Online Shoppers, Chanel Hit By Breach
Expert Insights28 July 2025
Q&A: A risk-based approach to banking security with Qualys
Bobsguide28 July 2025
Cyberattacks target email accounts of senior journalists
Press Gazette30 July 2025
Don't take risks with security opportunities
PCR Magazine4 August 2025
Upwind drafts in Nyx for cloud security keyhole surgery
Techzine4 August 2025
Qualys CEO on the Future of Cybersecurity: Risk Over Reaction
Techopedia28 July 2025
Inside the MoD’s New Cyber Command: Why the Government Initiative Needs to be on CISOs’ Radars
Assured7 July 2025
Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)
Help Net Security7 July 2025
July Patch Tuesday brings over 130 new flaws to address
ComputerWeekly7 July 2025
Patch Tuesday: A wormable bug in a security mechanism and other delights
The Stack26 June 2025
Vulnerability Debt: How Do You Put a Price on What to Fix?
Dark Reading23 June 2025
Why do CISOs evolve the same approach around risk?
The Stack18 June 2025
Balancing risk and security: Rich Seiersen
Security Insights11 June 2025
Smaller organizations nearing cybersecurity breaking point
CSO Online9 June 2025
Why Regulators Are Favouring A Converged Approach To Cyber Resilience
ISMS.online1 June 2025
New Linux Vulnerabilities Expose Password Hashes via Core Dumps
Infosecurity1 June 2025
Linux security flaw gives hackers access to sensitive data
Techzine30 May 2025
Two Linux flaws can lead to the disclosure of sensitive data
Security Affairs28 May 2025
Ransomware, regulation, and risk: Ciaran Martin on what’s next for cyber leadership
TechInformed22 May 2025
‘We’re creating a new category in IT security’: Qualys MD EMEA on channel involvement
CRN21 May 2025
Qualys: How VAR Fits Into Risk Management
SC Magazine19 May 2025
How to balance cybersecurity and innovation at an acceptable risk
Techzine19 May 2025
Why internal and external data needs to be assessed for your cyber risk strategy
Data Centre Review14 May 2025
PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
Infosecurity11 May 2025
Qualys MSPs join its mROC Partner Alliance
Enterprise Times6 May 2025
Banking on security with IDB Bank
TechInformed6 May 2025
Why is a Risk Operations Centre important for an MSP
Enterprise Times6 May 2025
Qualys signs partners to its risk operations centre framework
IT Europa28 April 2025
The 3Q sandwich: Strategies for improving risk and security operations
Machine28 April 2025
Qualys expands TotalAI to shore up AI & LLM model risk
ComputerWeekly.com24 April 2025
Qualys unveils Policy Audit to improve compliance
Enterprise Times24 April 2025
Security news from the week beginning 21st April 2025
Enterprise Times23 April 2025
New Qualys tool aims to streamline enterprise compliance audits
BetaNews13 April 2025
TubbTalk 179: Risk and the ROC Solution: What to Know for Growth
Tubblog22 April 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
ComputerWeekly.com16 April 2025
CVSS 10 bug allows pre-auth access to Erlang/OTP SSH servers, host devices
The Stack3 April 2025
Qualys exposes cloud and SaaS risks
ComputerWeekly27 March 2025
Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions
ITPro25 March 2025
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
ITPro23 March 2025
Rethinking risk -- are you taking the right path around security?
BetaNews5 March 2025
Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
Cloud Native Now24 February 2025
Public sector IT projects: stupendous incompetence or bad luck?
ComputerWeekly19 February 2025
Informing and empowering: the role for risk data in cyber security decision making
Resilience Forward18 February 2025
OpenSSH Flaws Expose Systems to Critical Attacks
Infosecurity18 February 2025
FreSSH bugs undiscovered for years threaten OpenSSH security
The Register18 February 2025
OpenSSH vulnerable to man-in-the-middle and DoS attacks
computing.co.uk18 February 2025
Managing cyber risk: It’s the context, stupid
computing.co.uk13 February 2025
CISA and FBI Warn Against Buffer Overflow Vulnerabilities
Infosecurity13 February 2025
Attackers Using Buffer Overflow Flaws More Often, U.S. Agencies Warn
SC Magazine13 February 2025
CISA, FBI Warn of Threats Exploiting Buffer Overflow Vulnerabilities
Security Buzz12 February 2025
UK monitoring group to classify cyber incidents on earthquake-like scale
CSO12 February 2025
Microsoft Fixes Another Two Actively Exploited Zero-Days
Infosecurity3 February 2025
Qualys TotalAppSec addresses API risks
Techzine30 January 2025
The Top Software Weaknesses of 2024, and What to Do About Them
Assured28 January 2025
Windows 10 Is Nearing End of Life, So What Should CISOs Do?
Assured27 January 2025
Centralize your risk response – the need for a Risk Operations Center
TechRadar23 January 2025
Effective Techniques to Refocus on Security Posture
Architecture&Governance22 January 2025
Qualys uncovers large-scale Murdoc Botnet campaign
Computing22 January 2025
Mirai variant Murdoc_Botnet targets cameras and routers
Techzine21 January 2025
New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers
Infosecurity15 January 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
ComputerWeekly.com15 January 2025
Three Hyper-V bugs exploited? Patch Tuesday is back with a bang. Take a breath...
The Stack6 January 2025
What does risk mean to you?
Digitalisation World6 January 2025
Is 2025 the year of (less cloud) on-premises IT?
TechzineFollow us on social media