United Kingdom media coverage.
20 December 2023
Over 25,000 vulnerabilites listed in 2023
TechInformed17 December 2023
$11 billion North Face owner, VF Corp., hit by ransomware
The Stack18 December 2023
Bugs are turning into exploits faster than ever
The Stack18 December 2023
More Than 26,000 Vulnerabilities Discovered in 2023
Infosecurity14 December 2023
Web application security -- five ways to improve your approach
BetaNews13 December 2023
A December Patch Tuesday recap: Azure Logic Apps, Power Platform get critical fix
The Stack13 December 2023
Software & Security: How to Move Supply Chain Security Up the Agenda
Dark Reading12 December 2023
Apache Warns of Critical Vulnerability in Struts 2
Infosecurity1 December 2023
Infrastructure as Code and Security – Five Ways to Improve Your Approach
Architecture&Governance29 November 2023
Improving risk management – combining security and cyber insurance practices
Network Security22 November 2023
Why CISA is extending cyber support to ‘resource poor’ organizations
ITPro19 November 2023
Security news from the week beginning 13 November 2023
Enterprise Times14 November 2023
Microsoft's Patch Tuesday fixes five zero-days
Computing31 October 2023
Shifting left: DevSecOps a proactive approach to cyber
Cyber Magazine9 November 2023
Qualys QSC: IDC explains top security risks for 2024
Techzine9 November 2023
Qualys announces its Enterprise TruRisk Platform
Enterprise Times8 November 2023
Qualys CEO Thakar: A unified view of business-related risk management & remediation
ERPtoday9 November 2023
Security and remediation – what metrics should you be using?
Enterprise Times8 November 2023
Qualys Expands IT Control Posture To ‘De-Risk’ Business
Forbes8 November 2023
Qualys QSC 2023: Day #1 live report - keynotes & breakouts
ComputerWeekly5 November 2023
IaC security - how to get your developers and security teams together
Digitalisation World1 November 2023
Building Your Risk Management and Security Strategy
Pipeline20 October 2023
Cloud security consolidation - improve your results
Digitalisation World16 October 2023
Software supply chain security: How to spot cyber risks hidden in plain sight
Innovation News Network15 October 2023
Beware the cost traps that can strain precious cybersecurity budgets
CSO12 October 2023
Presenteeism: The Security Risk of Showing Up When You Shouldn’t
IT Security Guru11 October 2023
Application Security Top Trends in 2023: Data Analysis by John Delaroderie of Qualys
SafetyDetectives10 October 2023
Curl Releases Fixes For High-Severity Vulnerability
Infosecurity10 October 2023
Helping Hands
Intersec Magazine9 October 2023
Be prepared to patch high-severity vulnerability in curl and libcurl
Help Net Security9 October 2023
Open source curl tool addresses high-severity vulnerability
computing.co.uk8 October 2023
With 20 billion installations, security teams buckle up ahead of news on a severe curl vulnerability
The Stack4 October 2023
Critical Glibc Bug Puts Linux Distributions at Risk
Infosecurity3 October 2023
Message to IT: Yes, you should install Apple security updates
ComputerWorld3 October 2023
How to Measure Patching and Remediation Performance
Dark Reading2 October 2023
Buffer overflow bug gives root on potentially millions of Linux boxes
The Stack20 September 2023
"BlueVoyant Partners with Qualys to Launch Comprehensive Vulnerability Identification Service – VISIBL for Qualys CYBERSECURITY"
UK Tech News22 September 2023
Improving remediation in practice -- five ways get ahead on fixes
BetaNews18 September 2023
Feature: Customers in the cloud? Watch out for misconfigurations
PCR Magazine18 September 2023
Solid air: building secure clouds
ERPtoday8 September 2023
North Koreans using new zero-day to target security researchers
ComputerWeekly28 August 2023
Security news from the week beginning 21st August 2023
Enterprise Times23 August 2023
Cloud insecurity: leaving the keys in the door?
Security Insights17 August 2023
What is the EU’s Cyber Resilience Act (CRA)?
ITPro15 August 2023
Boards Don't Want Security Promises — They Want Action
Dark Reading8 August 2023
Qualys Widens Control On Application Diversity Uncertainties
Forbes3 August 2023
New infosec products of the week: August 4, 2023
Help Net Security3 August 2023
Sophisticated Phishing Exploits Zero-Day Salesforce Vulnerability
Infosecurity1 August 2023
Google Cloud Platform Controls More Misconfigured Than Azure, AWS
Digit31 July 2023
Report: Google Cloud Platform is the most commonly misconfigured big-three cloud platform
ITPro31 July 2023
Over half of Azure and Google Cloud deployments fail CIS benchmarks
BetaNews23 July 2023
A new flaw in OpenSSH could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions.
Security Affairs23 July 2023
New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection
The Hacker News20 July 2023
Thinking about security? Don't forget web applications
PCR Magazine19 July 2023
OpenSSH vulnerability uncovered by researchers, RCE exploit developed
ITPro11 July 2023
Priorities in security: where can you improve your performance?
Data Centre Review3 July 2023
Know Your Enemy: The Nation-States Provoking a Hundred Cyber Battles
Assured18 June 2023
CVSS 4.0 aims for greater clarity on cybersecurity risk -- adds OT, response components
The Stack21 June 2023
From details to big picture: how to improve security effectiveness
CIO21 June 2023
Web Applications and Security - Where Should You Put Your Focus?
Devmio13 June 2023
Improving security results – where can you make the most difference?
TechNative6 June 2023
Patching and priorities - what do your customers need to know?
PCR Magazine6 June 2023
Security consolidation is about improving results, not just cost savings
ChannelPro5 June 2023
Three Vulnerabilities Discovered in Game Dev Tool RenderDoc
Infosecurity4 June 2023
From details to big picture: Five approaches to improve security
BetaNews31 May 2023
Preventing security problems from vulnerabilities and misconfigurations
Enterprise Times29 May 2023
Anatomy of a Stealthy Cyber Attack: 10 Steps to Take in the Aftermath of a Data Breach
Assured24 May 2023
Tricks of the trade: Securing cloud-first at Kingfisher
computing.co.uk23 May 2023
Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance
CRN18 May 2023
Qualys: 'We're not going to be able to scale without the channel'
CRN ChannelWeb.co.uk18 May 2023
New generation of CISOs is more engineering oriented, less about compliance - Qualys CEO
computing.co.uk14 May 2023
Managing the security estate
ComputerWeekly11 May 2023
Protect your weak spots
Intersec Magazine4 May 2023
Improving your security processes - where to put your focus for real world results
Digitalisation World2 May 2023
Vulnerabilities and misconfigurations – narrowing the focus
TechHQ30 April 2023
Security News from the week beginning 23rd April 2023
Enterprise Times27 April 2023
Isolating active vulnerabilities for better cybersecurity
TechHQ17 April 2023
Cyberinsurance Backstop: Can the Industry Survive Without One?
SecurityWeek11 April 2023
Patch Tuesday: Microsoft fixes actively exploited zero-day and seven 'critical' flaws
computing.co.uk11 April 2023
April Patch Tuesday fixes zero-day used to deliver ransomware
Computer Weekly4 April 2023
Getting connected – how to consolidate your operational technology and IT security approach
Enterprise Times4 April 2023
What’s so essentials about Cyber Essentials?
PCR Magazine2 April 2023
Security news from the week beginning 27th March 2023
Enterprise Times29 March 2023
The Future For Cyber Insurance: More Data, More Collaboration
InsuranceEdge28 March 2023
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
SecurityWeek6 March 2023
Open letter demands OWASP overhaul, warns of mass project exodus
CSO1 March 2023
Asset management and security -- how to secure your whole tech stack
BetaNews15 February 2023
https://www.spiceworks.com/it-security/vulnerability-management/news/february-2023-patch-tuesday/
Spiceworks14 February 2023
Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed
computing.co.uk13 February 2023
Security news from the week beginning 6th February 2023
Enterprise Times10 February 2023
Government launches public consultation on software security
computing.co.uk7 February 2023
Qualys now supports macOS in its cloud security tools
ComputerWorld6 February 2023
Security news from the week beginning 30th January 2023
Enterprise Times31 January 2023
WTF is an insider threat? – and why it’s a growing problem for businesses
Worklife10 January 2023
NCSC Cyber Essentials to be offered free to some small organisations
computing.co.uk10 January 2023
UK Charities Offered Free Cyber Essentials Support
Infosecurity10 January 2023
Why cybersecurity leaders are actively recruiting neurodiverse talent
Worklife11 January 2023
Microsoft's 'unusually large' Patch Tuesday fixes actively exploited zero day, 11 critical vulnerabilities
ITPro11 January 2023
Over 100 CVEs Addressed in First Patch Tuesday of 2023
Infosecurity9 January 2023
We analysed 90,000+ software vulnerabilities: Our findings may surprise you
The Stack3 January 2023
BitRAT malware deployed using stolen financial data
TechMonitorFollow us on social media