United Kingdom media coverage.
27 December 2024
The Top 10 Most Active Ransomware Groups of 2024
Infosecurity19 December 2024
AI Autopsy: Microlise and Supply Chain Dominoes
Assured17 December 2024
The Future For Software In 2025
Forbes10 December 2024
Russia is targeting unpatched vulnerabilities – what can tech leaders do to shore up defenses?
ITPro1 December 2024
Risk, collaboration and the role for a risk operations centre
Enterprise Times28 November 2024
Overcoming OT Security Challenges and Complexities
Supply Chain Digital26 November 2024
AI Autopsy: UnitedHealth Ransomware: An Entirely Preventable Attack
Assured21 November 2024
Alarming' security bugs lay low in Linux's needrestart utility for 10 years
The Register20 November 2024
Five Privilege Escalation Flaws Found in Ubuntu needrestart
Infosecurity6 November 2024
The “Hacking Back” Hullabaloo
The Stack4 November 2024
US election: Online misinformation and deep fakes risk violence, agencies warn
TechInformed31 October 2024
The future of cloud computing: Top trends and predictions
TechTarget31 October 2024
Developer Velocity & Security: Can You Get Out of the Way in Time?
Dark Reading28 October 2024
Security news from the week beginning 21 October 2024
Enterprise Times28 October 2024
What can accountants learn from other sectors to overcome challenges?
Financial Accountant25 October 2024
Petfood firm automates patch management to save IT team from a dog’s life
TechInformed24 October 2024
How Organisations Can Mitigate Botnet Attacks
ISMS.online17 October 2024
Cyberrisk quantification and how to measure it [Q&A]
BetaNews15 October 2024
A coffee with… Richard Seiersen, Chief Risk Technology Officer, Qualys
TechInformed14 October 2024
Qualys debuts Risk Operations Centre (ROC) in the Cloud
Digitalisation World10 October 2024
From NOC to SOC to ROC - Is Qualys Removing Alert Fatigue?
SC Magazine9 October 2024
Qualys launches cloud-based risk operations center
BetaNews9 October 2024
Qualys: Failing Safer Inside The Preparedness Paradox
Forbes9 October 2024
Vulnerable Instances of Log4J Still Being Used
SC Magazine9 October 2024
#QSC24: Understand Assets to Distil Alerts to Spot Flaws
SC Magazine8 October 2024
Qualys QSC: Sealing the lid on container security
Techzine8 October 2024
Qualys QSC Americas day #1: Rocking risk realities with ROC
ComputerWeekly.com8 October 2024
QSC24: Understand Business Risks Over 'Whack a Mole' Bug Fixes
SC Magazine8 October 2024
QSC24: Steps to Proactive Vulnerability Management
SC Magazine8 October 2024
Qualys: ROC solid ERP stems from unified re-risk
ERPtoday8 October 2024
Qualys launches cloud-based Risk Operations Center
Enterprise Times6 October 2024
How much do you really know? (page 63)
Inside Networks2 October 2024
Game Over? Cybersecurity Threats Surge in Online Gaming
Assured29 September 2024
The convergence of network and security – how it helps achieve business outcomes
ITPro26 September 2024
Printing vulnerability affecting Linux distros raises alarm
ComputerWeekly26 September 2024
Critical 9.9 Linux bug: CUPS your ears, the details are here!
The Stack15 September 2024
Patch management: A dull IT pain that won’t go away
CSO Online11 September 2024
Adopting AI - How Should Security and Developers Collaborate?
Devmio11 September 2024
The Iran cyber threat: Breaking down attack tactics
ITPro10 September 2024
Microsoft Fixes Four Actively Exploited Zero-Days
Infosecurity10 September 2024
Microsoft Patch Tuesday: Four zero day bugs squashed
Computing10 September 2024
September Patch Tuesday: Update before 1 October
Computer Weekly10 September 2024
Windows Security Function Bypassed By New 0-Day Threat, Microsoft Says
Forbes10 September 2024
Cyber workforce growth slows as tight budgets hit hiring targets — and it’s going to create a more dangerous threat landscape and send burnout through the roof
ITPro5 September 2024
CISA issues alert over two high-severity DrayTek vulnerabilities – here’s what you need to know
ITPro5 September 2024
Patch Tuesday: Microsoft fixes "concerning" RCE that rolls back earlier mitigations
The Stack27 August 2024
Setting strategy - are CISOs speaking the same language as the business?
The Stack27 August 2024
What can my organisation do about DDoS threats?
InformationAge21 August 2024
Why End of Life for Applications Is the Beginning of Life for Hackers
Dark Reading14 August 2024
CISA Issues Advisories For ICS Vulnerabilities
SC Magazine14 August 2024
Applying Security Everywhere – How to Prioritise Risks Across Multiple Platforms
Architecture&Governance13 August 2024
Busy Microsoft Patch Tuesday fixes six actively exploited zero days
Computing12 August 2024
Why attacks against critical national infrastructure (CNI) are such a threat – and how governments are responding
ITPro7 August 2024
Qualys combats AI model theft to de-risk machine intelligence
Techzine6 August 2024
Ivanti is the Rihanna of CVEs, Qualys' top exploit chart shows
The Stack6 August 2024
Number of Reported Vulnerabilities Increases in 2024
SC Magazine5 August 2024
CVEs Surge 30% in 2024, Only 0.91% Weaponized
Infosecurity5 August 2024
Qualys sees a surge in CVEs
Enterprise Times5 August 2024
2024 seeing more CVEs than ever before, but few are weaponised
Computer Weekly4 August 2024
Security news from the week beginning 29 July 2024
Enterprise Times4 August 2024
Qualys adds TotalAI to de-risk GenAI and LLMs
Enterprise Times1 August 2024
Qualys: Risk Remediation Is ‘Not A Patch’ On The Modern Approach
Forbes29 July 2024
Remote work is still causing security headaches for CISOs
ITPro17 July 2024
Ensuring Security in Container Adoption
Devmio17 July 2024
Another regreSSHion-like Bug Identified in OpenSSH
SC Magazine11 July 2024
Don’t pay the price - technical debt and security planning
Digitalisation World9 July 2024
Mammoth Microsoft Patch Tuesday fixes four zero-days, five critical bugs
Computing8 July 2024
Should more companies hire Chief Product Security Officers?
The Stack8 July 2024
Hyper-V zero-day stands out on a busy Patch Tuesday
ComputerWeekly7 July 2024
Security news from the week beginning 1 July 2024
Enterprise Times1 July 2024
“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux
Ars Technica1 July 2024
‘RegreSSHion’ bug raises alarms but experts question chances of widespread exploitation
The Record1 July 2024
Linux Users Beware: New OpenSSH Vulnerability Could Lead to System Takeover
Techopedia1 July 2024
Qualys Claims OpenSSH Vulnerability Could be Another Log4J
Enterprise Times1 July 2024
Vulnerability in OpenSSH server program gives hackers complete control
Techzine1 July 2024
Thousands of servers could be at risk due to major OpenSSH security flaw
TechRadar30 June 2024
New regreSSHion OpenSSH RCE bug gives root on Linux servers
Bleeping Computer30 June 2024
Nasty regreSSHion bug in OpenSSH puts roughly 700K Linux boxes at risk
The Register30 June 2024
New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems
The Hacker News30 June 2024
OpenSSH Vulnerability Could Affect 14 Million
SC Magazine30 June 2024
Critical' vulnerability in OpenSSH uncovered, affects almost all Linux systems
Computing30 June 2024
Millions of OpenSSH Servers Potentially Vulnerable to Remote regreSSHion Attack
Security Week30 June 2024
Pre-auth RCE to root in OpenSSH server: 700,000 instances exposed
The Stack30 June 2024
Critical OpenSSH vulnerability leaves over 14 million servers potentially at risk
ITPro30 June 2024
Critical OpenSSH Flaw Enables Full System Compromise
Infosecurity30 June 2024
CRITICAL UNAUTHENTICATED REMOTE CODE EXECUTION FLAW IN OPENSSH SERVER
Security Affairs30 June 2024
OpenSSH Critical Vulnerability Exposes Millions of Linux Servers to Arbitrary Code Attacks
CyberSecurity News30 June 2024
regreSSHion: Critical Vulnerability in OpenSSH Exposes Millions of Servers
Hackread30 June 2024
Thinking About Security, Fast & Slow
Dark Reading30 June 2024
700,000 OpenSSH servers vulnerable to remote code execution CVE
Cybersecurity Dive30 June 2024
OpenSSH RCE flaw affects glibc-based Linux systems.
CyberWire30 June 2024
OpenSSH Vulnerability CVE-2024-6387 released Jul 1 2024
Spiceworks18 June 2024
Going back to school on security
PCR Magazine18 June 2024
Top 10 Web Application Firewalls (WAFs) for 2024
EM36011 June 2024
Microsoft Patches One Critical and One Zero-Day Vulnerability
Infosecurity11 June 2024
Microsoft June Patch Tuesday has fixes for Windows, Outlook and SharePoint
Computing4 June 2024
Cloud encryption rates are disastrously low, research
Computing4 June 2024
Photos: Infosecurity Europe 2024
Help Net Security4 June 2024
Best Vulnerability Management Solution: Qualys VMDR
SC Magazine29 May 2024
Security news from the week beginning 20 May 2024
Enterprise Times27 May 2024
In the Spotlight: Falkirk Council
Think Digital Partners27 May 2024
Decoding the NCSC’s New Guidance for Cloud-Hosted SCADA
ISMS.online21 May 2024
Rockwell urges users to disconnect ICS equipment
ComputerWeekly20 May 2024
De-risking the business - how to evolve your approach to security
TechRadar14 May 2024
Security leaders report pressure from boards to downplay cyber risks
ITPro14 May 2024
Microsoft May Patch Tuesday fixes two actively exploited zero days
Computing14 May 2024
Microsoft Fixes Three Zero-Days in May Patch Tuesday
Infosecurity13 May 2024
Why cybersecurity staff burn out, and what to do about it
Computing12 May 2024
Security news from the week beginning 6th May 2024
Enterprise Times12 May 2024
How to Deal With Cybersecurity Extortion Breaches
Techopedia9 May 2024
SaaS success: secure data strategies for 2024
Raconteur8 May 2024
UK Bans Weak Passwords – No More ‘Admin’ & ‘1234’
Techopedia8 May 2024
Are you putting your business at risk by not patching these common vulnerabilities?
BetaNews6 May 2024
Change Healthcare went without cyber insurance before debilitating ransomware attack
CSO30 April 2024
How to Mitigate Cloud Security Risks: Exclusive with Qualys’s Pinkesh Shah
Techopedia30 April 2024
EMEA CISOs must address human factors behind cyber incidents
ComputerWeekly30 April 2024
Managing cybersecurity in local government - multiple hats, fewer tools
The Stack28 April 2024
What Is Cloud Provisioning?
Forbes25 April 2024
Minimum Viable Compliance: What You Should Care About and Why
Dark Reading25 April 2024
Can automating security relieve CISO pressure?
TechInformed24 April 2024
AI threats: The importance of a concrete strategy in fighting novel attacks
ITPro23 April 2024
Qualys giving 30-day free access to Enterprise TruRisk Platform
Enterprise Times23 April 2024
Ransomware Groups are Rebranding — As ‘Services’
Techopedia23 April 2024
How a council consolidated security tools and saved 40%
Computing22 April 2024
CISO-CEO communication gaps continue to undermine cybersecurity
The Stack22 April 2024
Security news from the week beginning 15 April 2024
Enterprise Times21 April 2024
Qualys reintroduces itself to the channel under new sales leadership
CRN ChannelWeb.co.uk16 April 2024
Qualys announces service to help organisations comply with UK NCSC cyber guidance
Computing7 April 2024
How is AI changing organisations?
Digital Leaders31 March 2024
Open source alert over intentionally placed backdoor
ComputerWeekly28 March 2024
CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation
Dark Reading27 March 2024
Getting Security Remediation on the Boardroom Agenda
Dark Reading27 March 2024
Australian Government Doubles Down On Cybersecurity in Wake of Major Attacks
Dark Reading26 March 2024
How to Tackle the Scourge of Cloud Misconfigurations
ISMS.online25 March 2024
Feds to CIOs: Actively ask your vendors if they’ve done a SQLi audit...
The Stack12 March 2024
Microsoft Patch Tuesday fixes two critical bugs
Computing29 February 2024
Infosec products of the month: February 2024
Help Net Security26 February 2024
AI threats: The importance of a concrete strategy in fighting novel attacks
ITPro26 February 2024
LockBit rises from the ashes, but will it pack the same punch as before?
ITPro14 February 2024
Microsoft's Patch Tuesday fixes two actively exploited vulnerabilities
Computing14 February 2024
Microsoft Fixes Two Zero-Days in February Patch Tuesday
Infosecurity13 February 2024
Unpatched Patches: Three Critical Patches that Just Keep Bleeding
Assured9 February 2024
Looking forward
Intersec Magazine8 February 2024
Qualys unveils TotalCloud 2.0
Digitalisation World8 February 2024
Qualys unveils TotalCloud 2.0
Data Centre Solutions8 February 2024
Qualys adds TruRisk Insights to TotalCloud 2.0
Enterprise Times7 February 2024
Qualys TotalCloud 2.0 measures cyber risk in cloud and SaaS apps
Help Net Security7 February 2024
Qualys TotalCloud 2.0 is first CNAPP to extend protection to SaaS apps
Techzine6 February 2024
Qualys to Drive More Business Through Channel Partners
Channel Futures5 February 2024
Qualys bolsters partnership with Orange Cyberdefense
Channel Pro1 February 2024
GNU C Library vulnerabilities could impact Linux systems, security company says
ITPro1 February 2024
Qualys enhances CyberSecurity Asset Management to discover risky unmanaged devices
Help Net Security31 January 2024
Linux users beware — this security flaw could allow attackers to get root on major distros, so take extra care
TechRadar30 January 2024
Qualys expands partnership with Orange Cyberdefense to optimize vulnerability management activities
Help Net Security30 January 2024
ROOT ACCESS VULNERABILITY IN GNU LIBRARY C (GLIBC) IMPACTS MANY LINUX DISTROS
Security Affairs25 January 2024
Ransomware in the UK: A Catastrophic Risk?
Assured25 January 2024
Web apps and security weaknesses
Security Insights24 January 2024
AI Ransomware Will Surge in Next Two Years, UK’s GCHQ Warns
Techopedia24 January 2024
Patch management: Why firms ignore vulnerabilities at their own risk
ITPro10 January 2024
Microsoft Fixes 12 RCE Bugs in January Patch Tuesday
Infosecurity10 January 2024
Microsoft's calm start to 2024: January Patch Tuesday addresses 49 bugs
Computing10 January 2024
Windows Kerberos, Hyper-V vulns among January Patch Tuesday bugs
ComputerWeekly8 January 2024
British Library cyber attack fallout highlights public sector security weaknesses
ITProFollow us on social media