USA media coverage.
December 31, 2015
Ten Security Trends To Follow in 2016
The Security LedgerDecember 22, 2015
Attackers are Hunting for Tampered Juniper Firewalls
PC AdvisorDecember 23, 2015
Facebook drops Flash, adding one more reason for users to stop using it altogether
Help Net SecurityDecember 14, 2015
Patch Tuesday December 2015: The most-important patches
BetaNewsDecember 1, 2015
Web Application Fingerprinting with Blind Elephant
(IN)SECUREDecember 11, 2015
Adobe Flash Player Update Includes 79 Fixes, for Crying Out Loud
The InquirerDecember 10, 2015
Microsoft sets record with 135 security bulletins issued in 2015
Fierce IT SecurityDecember 9, 2015
Windows 10 Upgrade Strategy Prepared by Microsoft
LidTimeDecember 10, 2015
Qualys 2016 Predictions: Survival of the Secure-est
VMblogDecember 4, 2015
Let's Encrypt Says Get Your Free Digital Security Certificates Here
SC MagazineNovember 20, 2015
Threat and vulnerability management market revenue to reach $5.3 billion
Help Net SecurityNovember 24, 2015
Dell ships laptops pre-vulnerable to Man-in-the-Middle attacks
SC MagazineDecember 15, 2015
IoT Industry Predictions for 2016
insideBIGDATANovember 23, 2015
Nmap 7 Brings Faster Scanning and Improved IPv6 Support
InfoWorldNovember 17, 2015
Cloud Without Borders: High Confidence Computing Anywhere Anytime
RSA ConferenceNovember 11, 2015
Microsoft Edge Browser Security Greatly Improved, Makes IE a Bad Memory
SoftpediaNovember 11, 2015
Ivan Ristic and SSL Labs: How one man changed the way we understand SSL
Help Net SecurityNovember 30, 2015
10 Security Trends to Look for in 2016
IT Business EdgeNovember 1, 2015
What Will Be The Biggest Risk Facing Boards in 2016?
Equilar C-Suite MagazineNovember 10, 2015
November Patch Tuesday closes gaps in Internet Explorer, Windows
TechTargetNovember 10, 2015
November Patch Tuesday Brings 12 Bulletins, 4 Critical
ThreatPostNovember 10, 2015
Microsoft releases 12 fixes, 4 rated critical
Network WorldNovember 10, 2015
Patch Tuesday Demonstrates Strength of Microsoft Edge Browser Security
CSONovember 23, 2015
Global Threat and Vulnerability Management Market Revenue to Reach $5.3 Billion
FirstpostOctober 26, 2015
SHA-2 encryption will make many sites inaccessible to users who can't afford newer tech
Help Net SecurityOctober 29, 2015
Is your information security program giving you static?
ComputerWorldOctober 23, 2015
As sites move to SHA2 encryption, millions face HTTPS lock-out
ZDNet.comOctober 22, 2015
Experts say Oracle patches need to be faster
TechTargetOctober 27, 2015
New Products of the Week
Network WorldOctober 19, 2015
Code review turns up bugs in underlying LibreSSL library
Fierce IT SecurityOctober 14, 2015
Microsoft fixes critical flaws in all versions of Windows and Office
Help Net SecurityOctober 13, 2015
October 2015 Patch Tuesday: Microsoft releases 3 critical and 3 important patches
Network WorldOctober 13, 2015
October Patch Tuesday plugs holes in IE, Edge browsers
TechTargetOctober 13, 2015
4 Ways to Improve Ecommerce Security for the Holidays
Practical EcommerceOctober 14, 2015
October Patch Tuesday: The First of 2015 with No Zero Day Exploits
Dispatch TimesOctober 2, 2015
Tech scrambles to oppose cyber bill
The HillOctober 13, 2015
Microsoft fixes critical IE vulnerabilities, other bugs on Patch Tuesday
SC MagazineSeptember 25, 2015
Thinking Continuous – A New Mindset for SCADA Security
InfoSecurity.comSeptember 22, 2015
Adobe releases surprise security update: 23 critical vulnerabilities fixed
ZDNet.comSeptember 16, 2015
Don't Let Your SMB Get Caught With Its Pants Down
HuffPostSeptember 15, 2015
Comparing the best Web application firewalls in the industry
SearchSecuritySeptember 4, 2015
Rudra: Framework for automated inspection of network capture files
Help Net SecurityAugust 31, 2015
States and Localities Consider Security as a Service
Government TechnologyAugust 31, 2015
CPU hardware performance counters for security
Help Net SecurityAugust 28, 2015
How to conduct proper AWS vulnerability scanning
TechTargetAugust 28, 2015
Comparing third-party vs. cloud providers' Web security scanners
TechTargetAugust 28, 2015
Amazon dumps Flash, and the Web is better off
CSO OnlineAugust 26, 2015
Killing Bugs: Focus on 'Half-Life'
CareersInfoSecurityAugust 18, 2015
Critical security vulnerability found in Internet Explorer
WinBetaAugust 18, 2015
Emergency Zero-Day Internet Explorer Security Fix Released
Redmondmag.comAugust 15, 2015
Microsoft Pushes Emergency Patch for IE
Krebs on SecurityAugust 14, 2015
Is Industry 4.0 safe – or will it prove to be a hacker's delight?
TechRadarAugust 11, 2015
How to bring your patch management up to speed
Information AgeAugust 11, 2015
Microsoft patches Windows 10, Edge, 4 critical holes, 2 exploits in the wild
Network WorldAugust 11, 2015
Microsoft Office bug highlights August 2015 Patch Tuesday
TechTargetAugust 11, 2015
Windows 10 gets its first set of security patches
PCWorld.comAugust 11, 2015
Small breaches may be only a tune up for the big show
ExaminerAugust 11, 2015
Microsoft's August Patch Includes 'Critical' Update for Windows 10
Redmondmag.comAugust 13, 2015
Poodle bug afflicts John McAfee SSL start-up
Computer Business ReviewAugust 12, 2015
Windows 10, Internet Explorer, Office Fixes on Patch Tuesday
CIO TodayAugust 7, 2015
IoT Security Flaws Give Hackers Total Smart Control
Computer Business ReviewAugust 5, 2015
The Right Approach for a Vulnerability Disclosure Policy
TechTargetAugust 6, 2015
How To Look Inside A Cloud
ForbesAugust 5, 2015
Qualys Unfurls Free Asset Inventory Service in the Cloud
IT Business EdgeAugust 5, 2015
Qualys offers free IT asset management service for enterprises
Network WorldJuly 26, 2015
Windows 10’s Gulf prospects: Win, Win or lose, lose?
ITPJuly 23, 2015
Four RCE Zero-Day Flaws Plague Internet Explorer: ZDI
Security WeekJuly 21, 2015
Reflections on virtualization security and the VENOM vulnerability
Help Net SecurityJuly 16, 2015
Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
Network WorldJuly 14, 2015
Adobe Flash Woes Prove Steve Jobs Was Right
ForbesJuly 15, 2015
Windows Server 2003 Died Yesterday and No One Cared
PC MagazineJuly 15, 2015
Patch Tuesday bids au revoir to Windows Server 2003
TechTargetJuly 14, 2015
Microsoft releases 14 bulletins on Patch Tuesday, ends Windows Server 2003 support
SC MagazineJuly 14, 2015
Microsoft Patch Tuesday says goodbye to Windows Server 2003
PCWorld.comJuly 14, 2015
July 2015 Patch Tuesday: Microsoft and Adobe attack Hacking Team zero-days
SearchSecurityJuly 14, 2015
July 2015 Patch Tuesday: Microsoft closes holes being exploited in the wild
Network WorldJuly 10, 2015
MIT's CodePhage helps computers automatically detect, devour their own bugs
Christian Science MonitorJuly 9, 2015
OpenSSL Fixes High-Severity, Narrow-Scope Vulnerability
Dark ReadingJuly 9, 2015
OpenSSL fixes serious flaw that could enable man-in-the-middle attacks
Network WorldJune 30, 2015
MIT tests 'software transplants' to fix buggy code
CSOJune 25, 2015
Growing threats make security vulnerability management essential
SearchSecurityJune 23, 2015
Adobe Flash Player Zero-Day Exploited in Attack Campaign
Security WeekJune 23, 2015
TLS security: What really matters and how to get there
Help Net SecurityJune 17, 2015
Several Security Bugs Found in GarrettCom Magnum Industrial Switches
Security WeekJune 15, 2015
Patch Tuesday June 2015
Information Security BuzzJune 11, 2015
Patch Tuesday Sunset Will Be a Mixed Bag for Windows Security
Tech News WorldJune 10, 2015
Patch Tuesday June 2015: 4 of Microsoft's 8 patches close remote code execution holes
Network WorldJune 9, 2015
Microsoft Releases Critical Security Updates for Internet Explorer, Windows
Security WeekJune 9, 2015
June 2015 Patch Tuesday brings critical IE security fix, Flash update
SearchSecurityJune 9, 2015
Microsoft fixes buggy browser
PCWorld.comJune 9, 2015
Prioritizing Patch Management Critical to Security
Security WeekJune 8, 2015
Windows 10: More security with non-stop patching
Help Net SecurityJune 2, 2015
Qualys CEO discusses cloud computing threats, 'cloud without borders'
SearchSecurityJune 2, 2015
Infosecurity Europe 2015, expo floor
Help Net SecurityMay 27, 2015
Secure updates are difficult, but less risky than not patching
TechTargetMay 20, 2015
As Auctions Go Digital, Hackers Set Their Sights On Buyers’ Data
New York ObserverMay 20, 2015
Logjam SSL/TLS Vulnerability Exposes Cryptographic Weakness
eWEEKMay 26, 2015
Interview: Wolfgang Kandek, CTO of Qualys
Cyber Jungle RadioMay 13, 2015
The cybersecurity talent war you don't hear about
CNBCMay 15, 2015
Experts' Opinions Mixed On VENOM Vulnerability
Dark ReadingMay 14, 2015
Product spotlight: Qualys Continuous Monitoring
Help Net SecurityMay 14, 2015
Venom vulnerability: toxic threat or hissing hyperbole?
SC MagazineMay 13, 2015
May Patch Tuesday delivers critical and important fixes
Help Net SecurityMay 13, 2015
Patch Tuesday Still Alive and Kickin'
CIO TodayMay 12, 2015
Microsoft patches 30 bugs with 13 bulletins on Patch Tuesday
SC MagazineMay 12, 2015
May 2015 Patch Tuesday isn't all about critical patches, experts say
SearchSecurityMay 12, 2015
Microsoft Patches Remote Code Execution Bugs in IE, Font Drivers, Windows Journal
ThreatPostMay 12, 2015
'Critical' IE Fix Highlights Microsoft's May Patch
Redmondmag.comMay 13, 2015
Microsoft fixes 46 flaws in Windows, IE, Office, other products
CSOMay 7, 2015
Beginning Of The End For Patch Tuesday
Dark ReadingMay 5, 2015
SC Magazine RSA 2015 Courtot Interview
SC MagazineApril 28, 2015
Qualys CAP for Continuous Asset, Inventory and Compliance
Enterprise Channels MEAMay 5, 2015
Security is a Matter of Public Record, any of us can Become the Source of an Attack
Globb Security.frMay 4, 2015
Product spotlight: Qualys Web Application Firewall 2.0
Help Net SecurityApril 28, 2015
All You Need to Know About the FREAK Vulnerability
Enterprise Channels MEAApril 28, 2015
The value of patching and how to do it properly
Help Net SecurityMay 20, 2015
New Logjam Browser Flaw Puts Web Surfers' Data at Risk
CIO TodayApril 27, 2015
New products of the week 04.27.2015
Network WorldApril 22, 2015
Continuous monitoring of perimeter and internal IT assets
Help Net SecurityApril 22, 2015
Qualys devises a virtual patch to protect against vulnerabilities
PCWorld.comApril 21, 2015
Qualys Web Application Firewall 2.0 Brings Virtual Patching, Event Response
Security WeekApril 21, 2015
Qualys takes step towards complete automation of web app security
Help Net SecurityApril 21, 2015
Qualys introduces new Web application firewall, cloud agent
SearchSecurityApril 21, 2015
The Web App Security Puzzle
CSOApril 21, 2015
Cloud agent platform for continuous IT asset inventory, security and compliance
Help Net SecurityApril 20, 2015
CSA, ICS2 introduce new cloud security certification
TechTargetApril 16, 2015
Making the Case for Cloud Security in Government
CSOApril 16, 2015
Microsoft Zero-Day Bug Being Exploited In The Wild
Dark ReadingApril 16, 2015
Oracle Critical Patch Update features important Java SE updates
SearchSecurityApril 14, 2015
April 2015 Patch Tuesday addresses critical HTTP.sys flaw
TechTargetApril 14, 2015
Microsoft Patch Tuesday April 2015 closes 0-day holes: 4 of 11 patches rated critical
Network WorldApril 14, 2015
Microsoft addresses 26 vulnerabilities, some critical, on Patch Tuesday
SC MagazineApril 14, 2015
Microsoft Patch Tuesday: The patches just keep coming
CIOApril 14, 2015
April Patch Tuesday: Microsoft Releases 4 'Critical' Fixes
Redmondmag.comApril 14, 2015
Microsoft Patches Critical HTTP.sys Vulnerability
ThreatPostApril 10, 2015
Calls to make software designers liable for security weakness
Financial TimesApril 7, 2015
FedRAMP: What You Need To Know
CSOApril 7, 2015
Qualys experts and customers to present security best practices at RSA Conference 2015
Help Net SecurityMarch 31, 2015
Amid growing SSL concerns, Qualys expands free public SSL tester
SearchSecurityMarch 25, 2015
How to Stay One Step Ahead of Hackers
Tom's GuideMarch 24, 2015
The State of SCADA Security
CSOMarch 20, 2015
Qualys Expands Its SSL/TLS Security Scanning Service
eWEEKMarch 20, 2015
The Morning Download: TD Bank Cautiously Testing Analytics as Security Tool
The Wall Street JournalMarch 20, 2015
Account credentials emerge as a weak spot for cloud app security
TechTargetMarch 19, 2015
Measuring the effectiveness of your vulnerability management program
CSOMarch 19, 2015
New bugs uncovered in encryption software
ReutersMarch 18, 2015
SSL Labs unveils free open source tool, new APIs
Help Net SecurityMarch 17, 2015
SSL Security Best Practices
CSOMarch 17, 2015
Qualys Releases SSL Labs APIs for Automated Website Testing
Security WeekMarch 10, 2015
Microsoft fixes FREAK vulnerability in Patch Tuesday update
PCWorld.comMarch 10, 2015
March 2015 Patch Tuesday: 5 of 14 rated Critical and Microsoft issues a fix for FREAK
Network WorldMarch 10, 2015
Microsoft Fixes Stuxnet Bug, Again
Krebs on SecurityMarch 10, 2015
March 2015 Patch Tuesday: Microsoft offers quick FREAK fix
TechTargetMarch 10, 2015
Microsoft issues 14 bulletins on Patch Tuesday, mitigates FREAK attacks
SC MagazineMarch 6, 2015
Microsoft warns Windows PCs also vulnerable to 'Freak' attacks
ReutersMarch 5, 2015
Practice Makes Perfect: Making Cyber Hygiene Part of Your Security Program
CSOMarch 5, 2015
Time to FREAK out? How to tell if you're vulnerable
ComputerWorldMarch 4, 2015
FREAK Attacks SSL/TLS Security, Putting Apple, Android Users at Risk
eWEEKMarch 4, 2015
FREAK Vulnerability Exposes SSL/TLS Security Hole
Security WeekMarch 4, 2015
Old Government Policies Influenced the FREAK Security Flaw
Windows IT ProMarch 3, 2015
FREAK Out: Yet Another New SSL/TLS Bug Found
Dark ReadingMarch 3, 2015
New FREAK Attack Threatens Many SSL Clients
ThreatPostMarch 2, 2015
Qualys Express Lite
SC MagazineMarch 1, 2015
BMC & Qualys Joint Solution
WRLapinsky BlogMarch 2, 2015
BMC and Qualys Join Forces to Improve Enterprise Security
Compliance WeekJanuary 27, 2015
GHOST glibc Remote Code Execution Vulnerability Affects All Linux Systems
ThreatPostJanuary 29, 2015
Linux systems hit by discovery of highly critical 'Ghost' flaw
Fierce IT SecurityFebruary 26, 2015
Bridging the Gap Between Security and Operations Teams
CSOFebruary 26, 2015
BMC and Qualys Join Forces to Improve Enterprise Security
Dark ReadingFebruary 20, 2015
Password security: Time for an upgrade?
CSOFebruary 19, 2015
The Huge Web Security Loophole That Most People Don't Know About, And How It's Being Fixed
Fast CompanyFebruary 10, 2015
February 2015 Patch Tuesday: Group Policy flaw tops three critical fixes
TechTargetFebruary 10, 2015
Microsoft Pushes Patches for Dozens of Flaws
Krebs on SecurityFebruary 10, 2015
Microsoft's Patch Tuesday release leaves one big vulnerability unpatched
ZDNet.comFebruary 11, 2015
Microsoft Addresses 41 IE Flaws in February Patch
Redmondmag.comFebruary 11, 2015
Microsoft Internet Explorer Update Repairs 41 Critical Vulnerabilities
CRNFebruary 11, 2015
Microsoft fixes IE memory problems
InfoWorldFebruary 9, 2015
New products of the week 2.09.2015
Network WorldFebruary 5, 2015
Qualys Adds Progressive Scanning to Web App Security Testing Service
Redmondmag.comFebruary 5, 2015
Scan Finds 'Ghost' Haunting Critical Business Applications
Dark ReadingFebruary 5, 2015
Tackling Enterprise Security Through a Continuous Approach
Silicon IndiaFebruary 4, 2015
Qualys Brings Industry¹s First Continuous Progressive Scanning Capabilities to Its Fast Growing Web Applications Scanning Solution
Dark ReadingFebruary 5, 2015
Halting Hackers
Lab ManagerFebruary 4, 2015
New tool to identify website vulnerabilities
BetaNewsFebruary 3, 2015
Qualys Adds Progressive Scanning Capabilities to Its WAS Solution
Security WeekJanuary 30, 2015
Ghost Linux vulnerability can be exploited through WordPress, other PHP apps
Network WorldJanuary 28, 2015
There's a GHOST in Linux's Library
Linux InsiderJanuary 28, 2015
'GHOST' bug in Linux library enables remote takeover of victim's system
SC MagazineJanuary 28, 2015
How A Linux "Ghost" Spooked The Security World
Read Write WebJanuary 28, 2015
Serious 'GHOST' Flaw Puts Linux at Risk
Bank Info SecurityJanuary 28, 2015
'Ghost' vulnerability poses high risk to Linux distributions
InfoWorldMarch 13, 2015
Avoid this Wireless Alarm Hack
SecurityInfoWatch.comJanuary 28, 2015
Newly Identified Linux Vulnerability Gives Full Access to Servers
Data Center KnowledgeJanuary 28, 2015
New Linux Bug Could Cause "a Lot of Collateral Damage on the Internet"
GizmodoJanuary 28, 2015
Severe “Ghost” flaw leaves Linux systems vulnerable to takeover
GigaOmJanuary 27, 2015
Qualys finds GHOST: Critical Linux remote code execution flaw
SearchSecurityJanuary 27, 2015
Critical 'Ghost' Vulnerability Impacts Linux Systems
Security WeekJanuary 27, 2015
Remotely exploitable ‘GHOST’ bug strikes all Linux distros
CSOJanuary 27, 2015
Linux makers release patch to thwart new 'Ghost' cyber threat
ReutersJanuary 27, 2015
Warning! Linux is being haunted by a G-G-G-GHOST vulnerability -- are you at risk?
BetaNewsJanuary 27, 2015
High severity vulnerability found in Linux GNU C library
Help Net SecurityJanuary 27, 2015
Highly critical “Ghost” allowing code execution affects most Linux systems
Ars TechnicaJanuary 27, 2015
GHOST, a critical Linux security hole, is revealed
ZDNet.comJanuary 21, 2015
Java Patch Plugs 19 Security Holes
Krebs on SecurityJanuary 13, 2015
Microsoft Patches Zero-Day Windows Flaws Disclosed by Google
eWEEKJanuary 13, 2015
Update: Microsoft's Patch Tuesday focuses on Windows
ComputerWorldJanuary 13, 2015
Light January 2015 Patch Tuesday delivers one critical Windows fix
TechTargetJanuary 9, 2015
Microsoft Disabling SSL 3.0 in Azure Storage Next Month
Redmondmag.comJanuary 9, 2015
Microsoft Ends Free Public Advance Security Notification Service
eWEEKJanuary 9, 2015
Microsoft's Patch Tuesday preview will no longer be made public
SC MagazineJanuary 8, 2015
Advanced notice of Microsoft Patch Tuesday fixes is no longer free
Network WorldJanuary 6, 2015
What CISOs, InfoSec Pros Have on Their 2015 Wish Lists
Security WeekFebruary 10, 2015
Linux GHOST bug haunts large percentage of enterprise apps
Data Center DynamicsDecember 21, 2015
Adobe Flash Player 19 Update Comes With Almost 80 Fixes
Daily FusionAugust 17, 2015
Cloud security without borders
Help Net SecurityFollow us on social media