United Kingdom media coverage.
-
20 May 2025
How to balance cybersecurity and innovation at an acceptable risk
Techzine
-
20 May 2025
Why internal and external data needs to be assessed for your cyber risk strategy
Data Centre Review
-
15 May 2025
PowerShell-Based Loader Deploys Remcos RAT in New Fileless Attack
Infosecurity
-
12 May 2025
Qualys MSPs join its mROC Partner Alliance
Enterprise Times
-
7 May 2025
Banking on security with IDB Bank
TechInformed
-
7 May 2025
Why is a Risk Operations Centre important for an MSP
Enterprise Times
-
7 May 2025
Qualys signs partners to its risk operations centre framework
IT Europa
-
29 April 2025
The 3Q sandwich: Strategies for improving risk and security operations
Machine
-
29 April 2025
Qualys expands TotalAI to shore up AI & LLM model risk
ComputerWeekly.com
-
25 April 2025
Qualys unveils Policy Audit to improve compliance
Enterprise Times
-
25 April 2025
Security news from the week beginning 21st April 2025
Enterprise Times
-
24 April 2025
New Qualys tool aims to streamline enterprise compliance audits
BetaNews
-
23 April 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
ComputerWeekly.com
-
17 April 2025
CVSS 10 bug allows pre-auth access to Erlang/OTP SSH servers, host devices
The Stack
-
14 April 2025
TubbTalk 179: Risk and the ROC Solution: What to Know for Growth
Tubblog
-
4 April 2025
Qualys exposes cloud and SaaS risks
ComputerWeekly
-
28 March 2025
Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions
ITPro
-
26 March 2025
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
ITPro
-
24 March 2025
Rethinking risk -- are you taking the right path around security?
BetaNews
-
5 March 2025
Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
Cloud Native Now
-
24 February 2025
Public sector IT projects: stupendous incompetence or bad luck?
ComputerWeekly
-
19 February 2025
Informing and empowering: the role for risk data in cyber security decision making
Resilience Forward
-
18 February 2025
OpenSSH Flaws Expose Systems to Critical Attacks
Infosecurity
-
18 February 2025
FreSSH bugs undiscovered for years threaten OpenSSH security
The Register
-
18 February 2025
OpenSSH vulnerable to man-in-the-middle and DoS attacks
computing.co.uk
-
18 February 2025
Managing cyber risk: It’s the context, stupid
computing.co.uk
-
13 February 2025
CISA and FBI Warn Against Buffer Overflow Vulnerabilities
Infosecurity
-
13 February 2025
Attackers Using Buffer Overflow Flaws More Often, U.S. Agencies Warn
SC Magazine
-
13 February 2025
CISA, FBI Warn of Threats Exploiting Buffer Overflow Vulnerabilities
Security Buzz
-
12 February 2025
UK monitoring group to classify cyber incidents on earthquake-like scale
CSO
-
12 February 2025
Microsoft Fixes Another Two Actively Exploited Zero-Days
Infosecurity
-
3 February 2025
Qualys TotalAppSec addresses API risks
Techzine
-
30 January 2025
The Top Software Weaknesses of 2024, and What to Do About Them
Assured
-
28 January 2025
Windows 10 Is Nearing End of Life, So What Should CISOs Do?
Assured
-
27 January 2025
Centralize your risk response – the need for a Risk Operations Center
TechRadar
-
23 January 2025
Effective Techniques to Refocus on Security Posture
Architecture&Governance
-
22 January 2025
Qualys uncovers large-scale Murdoc Botnet campaign
Computing
-
22 January 2025
Mirai variant Murdoc_Botnet targets cameras and routers
Techzine
-
21 January 2025
New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers
Infosecurity
-
15 January 2025
Biggest Patch Tuesday in years sees Microsoft address 159 vulnerabilities
ComputerWeekly.com
-
15 January 2025
Three Hyper-V bugs exploited? Patch Tuesday is back with a bang. Take a breath...
The Stack
-
6 January 2025
What does risk mean to you?
Digitalisation World
-
6 January 2025
Is 2025 the year of (less cloud) on-premises IT?
Techzine