United Kingdom media coverage.
-
21 December 2023
Over 25,000 vulnerabilites listed in 2023
TechInformed
-
19 December 2023
Bugs are turning into exploits faster than ever
The Stack
-
19 December 2023
More Than 26,000 Vulnerabilities Discovered in 2023
Infosecurity
-
18 December 2023
$11 billion North Face owner, VF Corp., hit by ransomware
The Stack
-
15 December 2023
Web application security -- five ways to improve your approach
BetaNews
-
13 December 2023
A December Patch Tuesday recap: Azure Logic Apps, Power Platform get critical fix
The Stack
-
13 December 2023
Software & Security: How to Move Supply Chain Security Up the Agenda
Dark Reading
-
12 December 2023
Apache Warns of Critical Vulnerability in Struts 2
Infosecurity
-
1 December 2023
Infrastructure as Code and Security – Five Ways to Improve Your Approach
Architecture&Governance
-
29 November 2023
Improving risk management – combining security and cyber insurance practices
Network Security
-
22 November 2023
Why CISA is extending cyber support to ‘resource poor’ organizations
ITPro
-
20 November 2023
Security news from the week beginning 13 November 2023
Enterprise Times
-
15 November 2023
Microsoft's Patch Tuesday fixes five zero-days
Computing
-
9 November 2023
Qualys QSC: IDC explains top security risks for 2024
Techzine
-
9 November 2023
Qualys announces its Enterprise TruRisk Platform
Enterprise Times
-
9 November 2023
Security and remediation – what metrics should you be using?
Enterprise Times
-
8 November 2023
Qualys CEO Thakar: A unified view of business-related risk management & remediation
ERPtoday
-
8 November 2023
Qualys Expands IT Control Posture To ‘De-Risk’ Business
Forbes
-
8 November 2023
Qualys QSC 2023: Day #1 live report - keynotes & breakouts
ComputerWeekly
-
5 November 2023
IaC security - how to get your developers and security teams together
Digitalisation World
-
1 November 2023
Shifting left: DevSecOps a proactive approach to cyber
Cyber Magazine
-
1 November 2023
Building Your Risk Management and Security Strategy
Pipeline
-
21 October 2023
Cloud security consolidation - improve your results
Digitalisation World
-
17 October 2023
Software supply chain security: How to spot cyber risks hidden in plain sight
Innovation News Network
-
16 October 2023
Beware the cost traps that can strain precious cybersecurity budgets
CSO
-
13 October 2023
Presenteeism: The Security Risk of Showing Up When You Shouldn’t
IT Security Guru
-
12 October 2023
Application Security Top Trends in 2023: Data Analysis by John Delaroderie of Qualys
SafetyDetectives
-
11 October 2023
Curl Releases Fixes For High-Severity Vulnerability
Infosecurity
-
11 October 2023
Helping Hands
Intersec Magazine
-
10 October 2023
Be prepared to patch high-severity vulnerability in curl and libcurl
Help Net Security
-
10 October 2023
Open source curl tool addresses high-severity vulnerability
computing.co.uk
-
9 October 2023
With 20 billion installations, security teams buckle up ahead of news on a severe curl vulnerability
The Stack
-
5 October 2023
Critical Glibc Bug Puts Linux Distributions at Risk
Infosecurity
-
4 October 2023
Message to IT: Yes, you should install Apple security updates
ComputerWorld
-
4 October 2023
How to Measure Patching and Remediation Performance
Dark Reading
-
3 October 2023
Buffer overflow bug gives root on potentially millions of Linux boxes
The Stack
-
22 September 2023
Improving remediation in practice -- five ways get ahead on fixes
BetaNews
-
20 September 2023
"BlueVoyant Partners with Qualys to Launch Comprehensive Vulnerability Identification Service – VISIBL for Qualys CYBERSECURITY"
UK Tech News
-
18 September 2023
Feature: Customers in the cloud? Watch out for misconfigurations
PCR Magazine
-
18 September 2023
Solid air: building secure clouds
ERPtoday
-
8 September 2023
North Koreans using new zero-day to target security researchers
ComputerWeekly
-
29 August 2023
Security news from the week beginning 21st August 2023
Enterprise Times
-
24 August 2023
Cloud insecurity: leaving the keys in the door?
Security Insights
-
18 August 2023
What is the EU’s Cyber Resilience Act (CRA)?
ITPro
-
16 August 2023
Boards Don't Want Security Promises — They Want Action
Dark Reading
-
9 August 2023
Qualys Widens Control On Application Diversity Uncertainties
Forbes
-
4 August 2023
New infosec products of the week: August 4, 2023
Help Net Security
-
4 August 2023
Sophisticated Phishing Exploits Zero-Day Salesforce Vulnerability
Infosecurity
-
2 August 2023
Google Cloud Platform Controls More Misconfigured Than Azure, AWS
Digit
-
1 August 2023
Report: Google Cloud Platform is the most commonly misconfigured big-three cloud platform
ITPro
-
1 August 2023
Over half of Azure and Google Cloud deployments fail CIS benchmarks
BetaNews
-
24 July 2023
A new flaw in OpenSSH could be potentially exploited to run arbitrary commands remotely on compromised hosts under specific conditions.
Security Affairs
-
24 July 2023
New OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injection
The Hacker News
-
21 July 2023
Thinking about security? Don't forget web applications
PCR Magazine
-
20 July 2023
OpenSSH vulnerability uncovered by researchers, RCE exploit developed
ITPro
-
12 July 2023
Priorities in security: where can you improve your performance?
Data Centre Review
-
4 July 2023
Know Your Enemy: The Nation-States Provoking a Hundred Cyber Battles
Assured
-
22 June 2023
From details to big picture: how to improve security effectiveness
CIO
-
22 June 2023
Web Applications and Security - Where Should You Put Your Focus?
Devmio
-
19 June 2023
CVSS 4.0 aims for greater clarity on cybersecurity risk -- adds OT, response components
The Stack
-
14 June 2023
Improving security results – where can you make the most difference?
TechNative
-
7 June 2023
Patching and priorities - what do your customers need to know?
PCR Magazine
-
7 June 2023
Security consolidation is about improving results, not just cost savings
ChannelPro
-
6 June 2023
Three Vulnerabilities Discovered in Game Dev Tool RenderDoc
Infosecurity
-
5 June 2023
From details to big picture: Five approaches to improve security
BetaNews
-
1 June 2023
Preventing security problems from vulnerabilities and misconfigurations
Enterprise Times
-
30 May 2023
Anatomy of a Stealthy Cyber Attack: 10 Steps to Take in the Aftermath of a Data Breach
Assured
-
25 May 2023
Tricks of the trade: Securing cloud-first at Kingfisher
computing.co.uk
-
24 May 2023
Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance
CRN
-
19 May 2023
Qualys: 'We're not going to be able to scale without the channel'
CRN ChannelWeb.co.uk
-
19 May 2023
New generation of CISOs is more engineering oriented, less about compliance - Qualys CEO
computing.co.uk
-
15 May 2023
Managing the security estate
ComputerWeekly
-
12 May 2023
Protect your weak spots
Intersec Magazine
-
5 May 2023
Improving your security processes - where to put your focus for real world results
Digitalisation World
-
3 May 2023
Vulnerabilities and misconfigurations – narrowing the focus
TechHQ
-
1 May 2023
Security News from the week beginning 23rd April 2023
Enterprise Times
-
28 April 2023
Isolating active vulnerabilities for better cybersecurity
TechHQ
-
18 April 2023
Cyberinsurance Backstop: Can the Industry Survive Without One?
SecurityWeek
-
12 April 2023
Patch Tuesday: Microsoft fixes actively exploited zero-day and seven 'critical' flaws
computing.co.uk
-
12 April 2023
April Patch Tuesday fixes zero-day used to deliver ransomware
Computer Weekly
-
5 April 2023
Getting connected – how to consolidate your operational technology and IT security approach
Enterprise Times
-
5 April 2023
What’s so essentials about Cyber Essentials?
PCR Magazine
-
3 April 2023
Security news from the week beginning 27th March 2023
Enterprise Times
-
30 March 2023
The Future For Cyber Insurance: More Data, More Collaboration
InsuranceEdge
-
29 March 2023
Most Weaponized Vulnerabilities of 2022 and 5 Key Risks: Report
SecurityWeek
-
6 March 2023
Open letter demands OWASP overhaul, warns of mass project exodus
CSO
-
1 March 2023
Asset management and security -- how to secure your whole tech stack
BetaNews
-
15 February 2023
https://www.spiceworks.com/it-security/vulnerability-management/news/february-2023-patch-tuesday/
Spiceworks
-
14 February 2023
Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed
computing.co.uk
-
13 February 2023
Security news from the week beginning 6th February 2023
Enterprise Times
-
10 February 2023
Government launches public consultation on software security
computing.co.uk
-
7 February 2023
Qualys now supports macOS in its cloud security tools
ComputerWorld
-
6 February 2023
Security news from the week beginning 30th January 2023
Enterprise Times
-
31 January 2023
WTF is an insider threat? – and why it’s a growing problem for businesses
Worklife
-
11 January 2023
Microsoft's 'unusually large' Patch Tuesday fixes actively exploited zero day, 11 critical vulnerabilities
ITPro
-
11 January 2023
Over 100 CVEs Addressed in First Patch Tuesday of 2023
Infosecurity
-
10 January 2023
NCSC Cyber Essentials to be offered free to some small organisations
computing.co.uk
-
10 January 2023
UK Charities Offered Free Cyber Essentials Support
Infosecurity
-
10 January 2023
Why cybersecurity leaders are actively recruiting neurodiverse talent
Worklife
-
9 January 2023
We analysed 90,000+ software vulnerabilities: Our findings may surprise you
The Stack
-
4 January 2023
BitRAT malware deployed using stolen financial data
TechMonitor