United Kingdom media coverage.
-
15 December 2022
Why diversity matters when recruiting cybersecurity staff
InformationAge
-
13 December 2022
Quiet quitting and security – why you should pay just enough attention
Enterprise Times
-
8 December 2022
Qualys 2023 Predictions: More spending won't solve cloud security problems, better foundations will be needed
VMblog
-
5 December 2022
How To Choose An Endpoint Detection And Response (EDR) Service
Expert Insights
-
5 December 2022
Qualys tightens security for Oracle Cloud Infrastructure
ERPtoday
-
5 December 2022
A New Linux Flaw Can Be Chained with Other Two Bugs to Gain Full Root Privileges
Linux Security
-
5 December 2022
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems
The Hacker News
-
3 December 2022
A new Linux flaw can be chained with other two bugs to gain full root privileges
Security Affairs
-
2 December 2022
Qualys introduces security features for Oracle Cloud Infrastructure
Techzine
-
28 November 2022
Interview: Asset Inventory Is The First Step In Vulnerability Management
Expert Insights
-
10 November 2022
Qualys CEO: Removing Risk In Cloud’s Continuous Challenge Zone
Forbes
-
10 November 2022
Qualys TotalCloud, Totaalvoetbal to unify the cloud-native team
Techzine
-
10 November 2022
Qualys Security Conference 2022: Corralling horses in an expanding edge rodeo
TechRepublic
-
9 November 2022
Spate of cyber attacks in Europe increases concerns about government defenses
The Next Web
-
9 November 2022
Microsoft serves smorgasbord of six zero-days
ComputerWeekly
-
9 November 2022
Qualys QSC 2022: Live show reports & insights
ComputerWeekly
-
7 November 2022
Security Professionals Urge Businesses To Step Up Cyber Security
Yorkshire Times
-
7 November 2022
Security news from the week beginning 31st October 2022
Enterprise Times
-
1 November 2022
OpenSSL flaw should be patched today
Fudzilla
-
1 November 2022
Getting started with the quantum cloud
ITPro
-
31 October 2022
Prepare today for potentially high-impact OpenSSL bug
ComputerWeekly
-
31 October 2022
October’s M&A News Roundup
Infosecurity
-
27 October 2022
What to expect from Qualys QSC 2022
ComputerWeekly
-
18 October 2022
Treat Essential Security Certificates as Valuable Assets
Dark Reading
-
18 October 2022
Linux kernel receives patches for serious Wi-Fi vulnerabilities
computing.co.uk
-
17 October 2022
Qualys acquires Blue Hexagon’s AI/Machine Learning platform
AI magazine
-
12 October 2022
Microsoft fixes lone zero-day on October Patch Tuesday
Computer Weekly
-
12 October 2022
Microsoft October 2022 Patch Tuesday Fixes 84 Flaws, Including Zero-Day
Infosecurity
-
10 October 2022
After Log4J US lawmakers rush to secure open source software
computing.co.uk
-
10 October 2022
#HowTo: Get an Attacker’s Eye View of Your Security
Infosecurity
-
9 October 2022
Real-time Analytics News for Week Ending October 8
RTInsights
-
4 October 2022
Qualys acquires Blue Hexagon, real-time malware detection in clouds
Techzine
-
17 September 2022
CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws
Infosecurity
-
16 September 2022
Six new vulnerabilities added to CISA catalogue
ComputerWeekly
-
14 September 2022
Ransomware: You’ve been hacked – so what’s the plan?
TechInformed
-
14 September 2022
September Patch Tuesday: Microsoft Patches 64 Vulnerabilities Including Two Zero-Day Flaws
Spiceworks
-
14 September 2022
Microsoft Fixes Two Zero-Days This Patch Tuesday
Infosecurity
-
14 September 2022
Microsoft patches 64 vulnerabilities on September Patch Tuesday
ComputerWeekly
-
14 September 2022
Microsoft's September Patch Tuesday fixes five critical bugs
computing.co.uk
-
13 September 2022
What Companies Must Do To Bring Their Cyber-Insurance Premiums Down – Part 2
TechHQ
-
13 September 2022
Top 10 Best Network Security Software & Providers – From $7 Per Month
TechRound
-
13 September 2022
Ransomware: the hackers and their marketplace
TechInformed
-
13 September 2022
Ransomware Insurance Cover Set to Die Out – What’s Going On With Cyber-Insurance? – Part 1
TechHQ
-
12 September 2022
The Top 10 Vulnerability Management Solutions
Expert Insights
-
29 August 2022
Why risk management matters
Data Centre Review
-
24 August 2022
What impact has recent cyber attacks had on the cyber insurance sector?
Insurance Intel
-
23 August 2022
Taking the risk-based approach to vulnerability patching
BetaNews
-
18 August 2022
US government set to outlaw leaky software in the military
ITPro
-
10 August 2022
Surge in CVEs as Microsoft Fixes Exploited Zero Day Bugs
infosecurity.com
-
10 August 2022
Microsoft fixes two-year-old MSDT vulnerability in August update
ComputerWeekly
-
10 August 2022
Patch Tuesday: Two zero-days and 17 critical flaws fixed in Microsoft's August update
Computing
-
10 August 2022
ITSM and Security – How and Why it is Critical to Improve Collaboration
ITSM
-
4 August 2022
Qualys Brings EASM To Cloud Platform
Security Buyer
-
3 August 2022
Qualys expands with external attack surface management
Techzine
-
15 July 2022
That Sudden Zip File in the Email Thread Could Be Malware
Lifewire
-
4 July 2022
Cyber insurance: What does a CISO need to know?
ComputerWeekly
-
4 July 2022
What Does IT Scalability Actually Mean?
Forbes
-
30 June 2022
CISA issues warning on active exploitation of PwnKit Linux vulnerability
computing.co.uk
-
23 June 2022
How to secure cloud environments by simplifying their complexity
TechRegister
-
23 June 2022
How to communicate risk to the board: the ‘Goldilocks’ approach
IDG Connect
-
6 June 2022
Qualys updates vulnerability management with automated workflows
BetaNews
-
6 June 2022
Qualys launches VMDR 2.0 with TruRisk
Techzine
-
1 June 2022
Security teams still face business finger-pointing and blame. Cultures need to shift
The Stack
-
16 May 2022
Automated patching, risk-based approach critical to resilience: First, face the “Bleedin’ obvious”
The Stack
-
13 May 2022
The CIO’s role in securing cloud environments and simplifying cloud management
Intelligentcio
-
12 May 2022
Microsoft’s Update Delivery Process Could Use a Tune-up
Lifewire
-
11 May 2022
Microsoft fixes three zero-days, eight critical flaws in May Patch Tuesday update
Computing
-
9 May 2022
AWS partners get skills-building, co-selling investment
TechTarget
-
6 May 2022
Security researchers: Here's how the Lazarus hackers start their attacks
ZDNet.com
-
5 May 2022
World Password Day: Security experts share insights on keeping passwords safe
VMblog
-
5 May 2022
Qualys hires a distributor for Italy
IT Europa
-
28 April 2022
No, Your Smart Speaker Isn’t Eavesdropping on You
Lifewire
-
8 April 2022
Qualys Multi-Vector EDR update prioritizes alert response
CSO
-
6 April 2022
Top 8 Network Scanning Tools & Software 2022
Enterprise Networking Planet
-
5 April 2022
Current state of the cybersecurity market and the evolving exposures to risk
PCR Magazine
-
5 April 2022
New endpoint solution reduces risk and streamlines patching
BetaNews
-
4 April 2022
Managing Security & Compliance Risk in Complex Hybrid IT Environments
Enterprise Times
-
23 March 2022
#HowTo: Get Cyber Essentials Certified
infosecurity.com
-
18 March 2022
How enterprises responded to Log4Shell
Beta News
-
17 March 2022
Extending detection and response -- why context is needed for security
Beta News
-
11 March 2022
Cyber Insurance and Business Risk: How the Relationship Is Changing Reinsurance & Policy Guidance
Dark Reading
-
9 March 2022
China’s APT41 exploited Log4j within hours
Computer Weekly
-
22 February 2022
Ubuntu and other Linux distros at risk from Oh Snap! More Lemmings security exploit
Beta News
-
18 February 2022
Vulnerability in Linux program enables local privilege escalation, researchers report
VentureBeat
-
18 February 2022
Dangerous privilege escalation bugs found in Linux package manager Snap
CSO Online
-
18 February 2022
Empathy and EI: How to prevent cyber team burnout
SC Media
-
18 February 2022
Multiple vulnerabilities put 40 million Ubuntu users at risk
TechRadar
-
18 February 2022
New Linux Privilege Escalation Flaw Uncovered in Snap Package Manager
The Hacker News
-
18 February 2022
Multiple vulnerabilities found in Snap-confine function on Linux systems
ZDNet.com
-
15 February 2022
Google doubles bug bounty rewards for Linux, Kubernetes exploits
ITPro
-
14 February 2022
Achieving excellence in a complicated IIoT constellation
The Manufacturer
-
12 February 2022
Why are cybersecurity asset management startups so hot right now?
TechCrunch
-
10 February 2022
Patch Management in Cloud Technology
Enterprise Networking Planet
-
9 February 2022
Microsoft's Patch Tuesday fixes 70 vulnerabilities after a troublesome January update
ITPro
-
9 February 2022
Microsoft's February Patch Tuesday update hits 48 vulnerabilities
Computing
-
31 January 2022
Flaw in Polkit's pkexec Puts Linux Users at Risk
Data Breach Today
-
31 January 2022
These critical security bugs put Linux servers at risk of attack
TechRadar
-
27 January 2022
PwnKit Linux bug lets an unprivileged user gain full root privileges
Computing
-
27 January 2022
Critical bug affects all major Linux distros: multiple exploits already published. Patch now.
The Stack
-
26 January 2022
Serious PwnKit flaw in default Linux installations requires urgent patching
CSO Online
-
26 January 2022
PwnKit: Local Privilege Escalation bug affects major Linux distros
Security Affairs
-
26 January 2022
PwnKit bug endangers Linux distributions worldwide
Computer Weekly
-
26 January 2022
Critical Linux vulnerability affects all major distributions
Techzine
-
26 January 2022
12-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
The Hacker News
-
26 January 2022
12-year-old Linux root privilege flaw has been "hiding in plain sight"
ITPro
-
26 January 2022
Qualys Identifies Exploitable Linux Vulnerability Hidden for 12 Years
eWEEK
-
26 January 2022
Every major Linux distro has a PwnKit flaw that is easily exploited to gain root access
BetaNews
-
25 January 2022
The evolution of Cyber Essentials - what you need to know
TechRadar
-
24 January 2022
What the UK's revised security guidelines mean for business [Q&A]
BetaNews
-
21 January 2022
Is it time for open source to be treated as a public good?
Computing
-
14 January 2022
18 Firefox 96 Security Fixes Include High-Risk Issues
Bank Info Security
-
13 January 2022
Microsoft Faces Wormable, Critical RCE Bug & 6 Zero-Days
The Cyber Post
-
13 January 2022
Microsoft Patch Tuesday: An 'Unusually Large' Patch Release
Bank Info Security
-
12 January 2022
Google sees most CVEs in 2021 — as eyes turn to “monster” first Patch Tuesday of 2022
The Stack
-
12 January 2022
Microsoft's "massive" January Patch Tuesday update fixes 90+ security flaws
Computing
-
12 January 2022
Microsoft fixes six zero-days in January Patch Tuesday update
Computer Weekly
-
12 January 2022
First Patch Tuesday of 2022 Brings Fix for a Critical 'Wormable' Windows Vulnerability
The Hacker News
-
12 January 2022
Microsoft takes aim at critical RCE flaws with "massive" Patch Tuesday update
ITPro
-
4 January 2022
New Year Resolutions for security in 2022 – better basics, applying processes widely, and more insight where it’s needed
Enterprise Times