United Kingdom media coverage.

Browse media coverage


Media inquiries

Mark Kember
OneBite PR
+44 0 1635 887 707[email protected]

Global media contacts Arrow Right

20 December 2023

Over 25,000 vulnerabilites listed in 2023

TechInformed
17 December 2023

$11 billion North Face owner, VF Corp., hit by ransomware

The Stack
18 December 2023

Bugs are turning into exploits faster than ever

The Stack
18 December 2023

More Than 26,000 Vulnerabilities Discovered in 2023

Infosecurity
14 December 2023

Web application security -- five ways to improve your approach

BetaNews
13 December 2023

A December Patch Tuesday recap: Azure Logic Apps, Power Platform get critical fix

The Stack
13 December 2023

Software & Security: How to Move Supply Chain Security Up the Agenda

Dark Reading
12 December 2023

Apache Warns of Critical Vulnerability in Struts 2

Infosecurity
1 December 2023

Infrastructure as Code and Security – Five Ways to Improve Your Approach

Architecture&Governance
29 November 2023

Improving risk management – combining security and cyber insurance practices

Network Security
22 November 2023

Why CISA is extending cyber support to ‘resource poor’ organizations

ITPro
19 November 2023

Security news from the week beginning 13 November 2023

Enterprise Times
14 November 2023

Microsoft's Patch Tuesday fixes five zero-days

Computing
31 October 2023

Shifting left: DevSecOps a proactive approach to cyber

Cyber Magazine
9 November 2023

Qualys QSC: IDC explains top security risks for 2024

Techzine
9 November 2023

Qualys announces its Enterprise TruRisk Platform

Enterprise Times
8 November 2023

Qualys CEO Thakar: A unified view of business-related risk management & remediation

ERPtoday
9 November 2023

Security and remediation – what metrics should you be using?

Enterprise Times
8 November 2023

Qualys Expands IT Control Posture To ‘De-Risk’ Business

Forbes
8 November 2023

Qualys QSC 2023: Day #1 live report - keynotes & breakouts

ComputerWeekly
5 November 2023

IaC security - how to get your developers and security teams together

Digitalisation World
1 November 2023

Building Your Risk Management and Security Strategy

Pipeline
20 October 2023

Cloud security consolidation - improve your results

Digitalisation World
16 October 2023

Software supply chain security: How to spot cyber risks hidden in plain sight

Innovation News Network
15 October 2023

Beware the cost traps that can strain precious cybersecurity budgets

CSO
12 October 2023

Presenteeism: The Security Risk of Showing Up When You Shouldn’t

IT Security Guru
11 October 2023

Application Security Top Trends in 2023: Data Analysis by John Delaroderie of Qualys

SafetyDetectives
10 October 2023

Curl Releases Fixes For High-Severity Vulnerability

Infosecurity
10 October 2023

Helping Hands

Intersec Magazine
9 October 2023

Be prepared to patch high-severity vulnerability in curl and libcurl

Help Net Security
9 October 2023

Open source curl tool addresses high-severity vulnerability

computing.co.uk
8 October 2023

With 20 billion installations, security teams buckle up ahead of news on a severe curl vulnerability

The Stack
4 October 2023

Critical Glibc Bug Puts Linux Distributions at Risk

Infosecurity
3 October 2023

Message to IT: Yes, you should install Apple security updates

ComputerWorld
3 October 2023

How to Measure Patching and Remediation Performance

Dark Reading
2 October 2023

Buffer overflow bug gives root on potentially millions of Linux boxes

The Stack
20 September 2023

"BlueVoyant Partners with Qualys to Launch Comprehensive Vulnerability Identification Service – VISIBL for Qualys CYBERSECURITY"

UK Tech News
22 September 2023

Improving remediation in practice -- five ways get ahead on fixes

BetaNews
18 September 2023

Feature: Customers in the cloud? Watch out for misconfigurations

PCR Magazine
18 September 2023

Solid air: building secure clouds

ERPtoday
8 September 2023

North Koreans using new zero-day to target security researchers

ComputerWeekly
28 August 2023

Security news from the week beginning 21st August 2023

Enterprise Times
23 August 2023

Cloud insecurity: leaving the keys in the door?

Security Insights
17 August 2023

What is the EU’s Cyber Resilience Act (CRA)?

ITPro
15 August 2023

Boards Don't Want Security Promises — They Want Action

Dark Reading
8 August 2023

Qualys Widens Control On Application Diversity Uncertainties

Forbes
3 August 2023

New infosec products of the week: August 4, 2023

Help Net Security
3 August 2023

Sophisticated Phishing Exploits Zero-Day Salesforce Vulnerability

Infosecurity
1 August 2023

Google Cloud Platform Controls More Misconfigured Than Azure, AWS

Digit
31 July 2023

Report: Google Cloud Platform is the most commonly misconfigured big-three cloud platform

ITPro
31 July 2023

Over half of Azure and Google Cloud deployments fail CIS benchmarks

BetaNews
23 July 2023

A new flaw in OpenSSH could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions.

Security Affairs
23 July 2023

New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection

The Hacker News
20 July 2023

Thinking about security? Don't forget web applications

PCR Magazine
19 July 2023

OpenSSH vulnerability uncovered by researchers, RCE exploit developed

ITPro
11 July 2023

Priorities in security: where can you improve your performance?

Data Centre Review
3 July 2023

Know Your Enemy: The Nation-States Provoking a Hundred Cyber Battles

Assured
18 June 2023

CVSS 4.0 aims for greater clarity on cybersecurity risk -- adds OT, response components

The Stack
21 June 2023

From details to big picture: how to improve security effectiveness

CIO
21 June 2023

Web Applications and Security - Where Should You Put Your Focus?

Devmio
13 June 2023

Improving security results – where can you make the most difference?

TechNative
6 June 2023

Patching and priorities - what do your customers need to know?

PCR Magazine
6 June 2023

Security consolidation is about improving results, not just cost savings

ChannelPro
5 June 2023

Three Vulnerabilities Discovered in Game Dev Tool RenderDoc

Infosecurity
4 June 2023

From details to big picture: Five approaches to improve security

BetaNews
31 May 2023

Preventing security problems from vulnerabilities and misconfigurations

Enterprise Times
29 May 2023

Anatomy of a Stealthy Cyber Attack: 10 Steps to Take in the Aftermath of a Data Breach

Assured
24 May 2023

Tricks of the trade: Securing cloud-first at Kingfisher

computing.co.uk
23 May 2023

Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance

CRN
18 May 2023

Qualys: 'We're not going to be able to scale without the channel'

CRN ChannelWeb.co.uk
18 May 2023

New generation of CISOs is more engineering oriented, less about compliance - Qualys CEO

computing.co.uk
14 May 2023

Managing the security estate

ComputerWeekly
11 May 2023

Protect your weak spots

Intersec Magazine
4 May 2023

Improving your security processes - where to put your focus for real world results

Digitalisation World
2 May 2023

Vulnerabilities and misconfigurations – narrowing the focus

TechHQ
30 April 2023

Security News from the week beginning 23rd April 2023

Enterprise Times
27 April 2023

Isolating active vulnerabilities for better cybersecurity

TechHQ
17 April 2023

Cyberinsurance Backstop: Can the Industry Survive Without One?

SecurityWeek
11 April 2023

Patch Tuesday: Microsoft fixes actively exploited zero-day and seven 'critical' flaws

computing.co.uk
11 April 2023

April Patch Tuesday fixes zero-day used to deliver ransomware

Computer Weekly
4 April 2023

Getting connected – how to consolidate your operational technology and IT security approach

Enterprise Times
4 April 2023

What’s so essentials about Cyber Essentials?

PCR Magazine
2 April 2023

Security news from the week beginning 27th March 2023

Enterprise Times
29 March 2023

The Future For Cyber Insurance: More Data, More Collaboration

InsuranceEdge
28 March 2023

Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report

SecurityWeek
6 March 2023

Open letter demands OWASP overhaul, warns of mass project exodus

CSO
1 March 2023

Asset management and security -- how to secure your whole tech stack

BetaNews
15 February 2023

https://www.spiceworks.com/it-security/vulnerability-management/news/february-2023-patch-tuesday/

Spiceworks
14 February 2023

Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed

computing.co.uk
13 February 2023

Security news from the week beginning 6th February 2023

Enterprise Times
10 February 2023

Government launches public consultation on software security

computing.co.uk
7 February 2023

Qualys now supports macOS in its cloud security tools

ComputerWorld
6 February 2023

Security news from the week beginning 30th January 2023

Enterprise Times
31 January 2023

WTF is an insider threat? – and why it’s a growing problem for businesses

Worklife
10 January 2023

NCSC Cyber Essentials to be offered free to some small organisations

computing.co.uk
10 January 2023

UK Charities Offered Free Cyber Essentials Support

Infosecurity
10 January 2023

Why cybersecurity leaders are actively recruiting neurodiverse talent

Worklife
11 January 2023

Microsoft's 'unusually large' Patch Tuesday fixes actively exploited zero day, 11 critical vulnerabilities

ITPro
11 January 2023

Over 100 CVEs Addressed in First Patch Tuesday of 2023

Infosecurity
9 January 2023

We analysed 90,000+ software vulnerabilities: Our findings may surprise you

The Stack
3 January 2023

BitRAT malware deployed using stolen financial data

TechMonitor

Follow us on social media