USA media coverage.
December 22, 2022
CSPM evolution – start secure, stay secure
SC MediaDecember 22, 2022
How to improve workload security
SC MediaDecember 19, 2022
How to strengthen your multi-cloud security posture
SC MediaDecember 15, 2022
Simplifying Cloud Security – Terry Barber, Parag Bajaria
SC MediaDecember 14, 2022
Scanning assets in the cloud: Challenges and improvements to make
SC MediaDecember 5, 2022
Top 10 risk-based vulnerability management (VM) tools for 2022
VentureBeatDecember 5, 2022
More than 150 Oracle Access Management systems exposed to bug highlighted by CISA
The RecordDecember 1, 2022
Infosec products of the month: November 2022
Help Net SecurityNovember 22, 2022
Qualys QSC Wrap-Up: Risk and Simplicity
Security BoulevardNovember 19, 2022
Simplifying cloud native security for posture management and AppSec
SC MediaNovember 10, 2022
VMDR: What it is, and how it fits into cloud-native infrastructure and applications
SC MediaNovember 9, 2022
ProxyNotShell Finally Gets Patched by Microsoft
E Security PlanetNovember 9, 2022
Microsoft releases patches for 68 vulnerabilities, including ‘ProxyNotShell’ zero-days
The RecordNovember 8, 2022
November Patch Tuesday: Microsoft Finally Patches Two NotProxyShell And Four Other Zero-day Flaws
SpiceworksNovember 9, 2022
Microsoft Quashes Bevy of Actively Exploited Zero-Days for November Patch Tuesday
Dark ReadingNovember 7, 2022
Cybersecurity M&A Roundup: 39 Deals Announced in October 2022
SecurityWeekNovember 4, 2022
New infosec products of the week: November 4, 2022
Help Net SecurityNovember 4, 2022
Qualys previews TotalCloud FlexScan for multicloud security management
CSO OnlineNovember 1, 2022
Nontraditional applicants could be answer to talent shortage as cybersecurity market projected to reach $2T
FortuneNovember 1, 2022
OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities
The Hacker NewsNovember 1, 2022
Qualys Introduces TotalCloud with FlexScan Delivering Cloud-Native VMDR
VMblogNovember 1, 2022
Qualys TotalCloud with FlexScan helps enterprises strengthen cloud-native security
Help Net SecurityOctober 20, 2022
Experts on securing the public cloud
SC MediaOctober 16, 2022
Cybersecurity M&A Roundup for October 1-15, 2022
Security WeekOctober 13, 2022
Concerns Over Fortinet Flaw Mount; PoC Released, Exploit Activity Grows
Dark ReadingOctober 12, 2022
‘Critical’ vulnerability found in Siemens industrial tool, allowing theft of cryptographic keys
The RecordOctober 11, 2022
October Patch Tuesday: Two Zero-day and 15 Critical Vulnerabilities Patched by Microsoft
SpiceworksOctober 11, 2022
https://www.esecurityplanet.com/threats/microsoft-patch-tuesday-leaves-proxynotshell-exposed/
eSecurity PlanetOctober 11, 2022
Millions of PCs branded dangerous as Microsoft warns users to act now
The SunOctober 9, 2022
Qualys Acquires Blue Hexagon’s AI/Machine Learning Platform
AiThorityOctober 3, 2022
State-Sponsored Hackers Likely Targeted 10 Organizations With M.S. Exchange 0-Day Exploits
Gaming IdeologyOctober 3, 2022
CISA Releases Directives On Asset Discovery And Vulnerability Enumeration
ForresterOctober 4, 2022
Qualys Acquires Blue Hexagon’s AI/Machine Learning Platform
ITechnology SeriesOctober 4, 2022
Qualys Buys Blue Hexagon, Adds AI, ML Capabilities to Cloud Platform
MSSP AlertOctober 3, 2022
Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree
The RegisterOctober 3, 2022
Qualys Buys Blue Hexagon to Aid Secure Public Cloud Adoption
Bank Info SecurityOctober 2, 2022
October Product Update
Security BoulevardOctober 2, 2022
11 old software bugs that took way too long to squash
CSOSeptember 29, 2022
Iran and Cybersecurity: What Technologists Need to Know
Dice InsightsOctober 2, 2022
Microsoft confirms hackers are actively exploiting Exchange zero-day flaws
VentureBeatSeptember 29, 2022
Microsoft is rushing to patch new zero-day Exchange vulnerabilities
ProtocolSeptember 30, 2022
State-Sponsored Hackers Likely Exploited MS Exchange 0-Days Against ~10 Organizations
The Hacker NewsSeptember 29, 2022
Fix for two Exchange zero-days on ‘accelerated timeline,’ says Microsoft
SC MediaSeptember 28, 2022
Researchers disclose new zero-day Microsoft Exchange vulnerability
ProtocolSeptember 28, 2022
Qualys Rings the Nasdaq Stock Market Closing Bell
NASDAQSeptember 28, 2022
Why Cybersecurity Is Not Feeling the Economic Downturn as Compared to Other Companies
NASDAQSeptember 28, 2022
Qualys (QLYS) CEO On Cloud Security & 10 Year Anniversary
TD AmeritradeSeptember 27, 2022
Leveraging automation in cybersecurity reduces workforce reliance, says Qualys president & CEO
CNBCSeptember 26, 2022
SC eBook preview: Top 5 public cloud infrastructure challenges
SC MediaSeptember 19, 2022
Maximizing Risk-Reduction in your Security Program – Paul Baird – BSW #277
SecurityWeeklySeptember 20, 2022
Cloud security compliance checklist
SC MediaSeptember 19, 2022
Most common SAP vulnerabilities attackers try to exploit
CSOSeptember 14, 2022
Implementing and managing cloud security compliance
SC MediaSeptember 13, 2022
Microsoft fixes Windows security hole likely widely exploited by miscreants
The RegisterSeptember 14, 2022
Cisco Won’t Fix Flaw in Routers, Citing End of Life
Security BoulevardSeptember 14, 2022
Unflagging Iranian Threat Activity Spurs Warnings, Indictments From US Government
Dark ReadingSeptember 12, 2022
Microsoft's Latest Security Update Fixes 64 New Flaws, Including a Zero-Day
Dark ReadingSeptember 13, 2022
Microsoft's Latest Security Update Fixes 64 New Flaws, Including a Zero-Day
The Hacker NewsSeptember 11, 2022
Google Chrome, D-Link bugs among twelve added to CISA’s list of known exploited vulnerabilities
The RecordSeptember 8, 2022
LockBit, ALPHV & Other Ransomware Gang Leak Sites Hit by DDoS Attacks
Dark ReadingSeptember 8, 2022
AT&T outs new 'Shikitega' Linux malware
itnewsSeptember 7, 2022
Dump these small-biz routers, says Cisco, because we won't patch their flawed VPN
The RegisterSeptember 5, 2022
Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor
SC MediaAugust 29, 2022
Qualys Discovers Two Major Vulnerabilities – Techstrong TV
Security BoulevardAugust 31, 2022
Infosec products of the month: August 2022
Help Net SecurityAugust 21, 2022
Qualys API best practices: Cybersecurity asset management API
SC MediaAugust 15, 2022
Qualys Joins the Big Leagues in Attack Surface Management
IDCAugust 21, 2022
Best Vulnerability Management Solution | Qualys Vulnerability Management Detection and Response
SC MediaAugust 21, 2022
How Qualys Reduces Risk and Enables Tool Consolidation
Dark ReadingAugust 16, 2022
eSecurity Planet’s 2022 Cybersecurity Product Awards
eSecurity PlanetAugust 16, 2022
Qualys August 2022 – Patch Tuesday
Cybersecurity AseanAugust 15, 2022
Sumedh Thakar on Fusing Vulnerability and Patch Management
Bank Info SecurityAugust 9, 2022
The challenges of managing the modern external attack surface
Help Net SecurityAugust 3, 2022
Qualys Brings External Attack Surface Management (EASM) to the Qualys Cloud Platform
AiThorityAugust 3, 2022
Qualys CyberSecurity Asset Management 2.0 with EASM identifies unknown internet-facing assets
Help Net SecurityAugust 2, 2022
How Qualys is moving channel partners to resell and go to market with cloud security
Global CIO ForumAugust 2, 2022
Patch Management: An Important Service for MSPs and MSSPs
Channel InsiderAugust 2, 2022
Qualys adds EASM capabilities to its platform
ITopstimesAugust 2, 2022
Qualys adds external attack management capability to cloud security platform
CSOAugust 1, 2022
Cloud security automation is key to reducing time to remediate
SC MediaJuly 31, 2022
North Koreans Suspected of Using Fake Resumes to Steal Crypto
BNNBloombergJuly 31, 2022
North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam
BloombergJuly 24, 2022
Automated vulnerability remediation: Making it work
SC MediaJuly 19, 2022
VMDR: Inside vulnerability management, detection and response
TechTargetJuly 11, 2022
Cloud-native app protection platforms: what they are and what they bring to the table
SC MediaJuly 5, 2022
5 Channel Partner Program and MSP Market Updates: 06 July 2022
Channele2eJuly 5, 2022
Managed Security Services Provider (MSSP) Market News: 06 July 2022
MSSP AlertJuly 6, 2022
Hacking Linux is Easy with PwnKit Brittany Brittany Day 1 min read 284 07/05/2022
Linux SecurityJune 30, 2022
Infosec products of the month: June 2022
Help Net SecurityJune 29, 2022
Hacking Linux is Easy with PwnKit
eSecurity PlanetJune 22, 2022
How to secure cloud environments by simplifying their complexity
VentureBeatJune 16, 2022
Organizations prioritizing attacks that make headlines over other equally impactful incidents
Black HatJune 20, 2022
Everything You Need to Know About Web Application Penetration Testing Services
HackernoonJune 13, 2022
Security in the Cloud Requires a New Mindset
Data Breach TodayJune 15, 2022
Qualys’ new approach to reducing vulnerabilities and cyber risk
SC MediaJune 13, 2022
Patch management vs. vulnerability management: Key differences
TechTargetJune 11, 2022
Week in review: Follina exploit delivers Qbot malware, Patch Tuesday forecast, RSAC 2022
Help Net SecurityJune 9, 2022
New infosec products of the week: June 10, 2022
Help Net SecurityJune 6, 2022
Qualys upgrades vulnerability management solution
CSO OnlineJune 6, 2022
RSA Conference 2022 - Announcements Summary (Day 1)
Security WeekJune 5, 2022
Qualys Launches VMDR 2.0 with TruRisk Scores and Automated Remediation Workflows
VMblogJune 5, 2022
Qualys launches VMDR 2.0 with TruRisk scoring
ITopstimesJune 5, 2022
Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level
Help Net SecurityJune 5, 2022
Qualys VMDR 2.0 provides security teams with insights into an organization’s risk posture
Help Net SecurityJune 5, 2022
New Qualys VMDR 2.0 delivers insights into risk posture
SiliconANGLEJune 5, 2022
Qualys Adds Risk Assessment to Cloud Security Platform
Security BoulevardMay 31, 2022
Infosec products of the month: May 2022
Help Net SecurityMay 30, 2022
Cops' Killer Bee stings credential-stealing scammer
The RegisterMay 29, 2022
Linux malware is on the rise—6 types of attacks to look for
CSOMay 24, 2022
Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco
Dark ReadingMay 23, 2022
Automated Vulnerability Scanning Tools: What, Why, and How
SNN NewsMay 21, 2022
Qualys Launches Enhanced Partner Program
Channel ImpactMay 17, 2022
Qualys launches new solution for remediating threats efficiently
ITopstimesMay 17, 2022
Qualys Adds Custom Assessment and Remediation to its Cloud Platform
VMblogMay 17, 2022
Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks
Help Net SecurityMay 16, 2022
Qualys Adds Custom Assessment and Remediation to Its Cloud Platform
Dark ReadingMay 16, 2022
3 Best Free Online Tools to Scan Website Security Vulnerabilities & Malware
Elist10May 5, 2022
Qualys Launches Enhanced Partner Program to Drive Further Growth and Enable Customer Success
AiThorityMay 2, 2022
Qualys Unveils Enhanced Partner Program with More Benefits, Protection
Channel FuturesMay 2, 2022
Qualys MSSPs, MSPs Gain Channel Partner Program Updates
MSSP AlertApril 29, 2022
Don’t expect to get your data back from the Onyx ransomware group
The RegisterApril 19, 2022
Endpoint Detection and Response: The Must-Have Features
Data Breach TodayApril 28, 2022
Five Eyes nations reveal 2021's fifteen most-exploited flaws
The RegisterApril 12, 2022
Patch Tues: Microsoft Releases Fixes for 145 Vulnerabilities
Bank Info SecurityApril 13, 2022
Apache says Struts 2 security bug wasn't fully fixed in 2020
The RegisterApril 13, 2022
AppOmni, DoControl focus on managing security across SaaS apps
SC MediaApril 4, 2022
Managed Security Services Provider (MSSP) News: 05 April 2022
MSSP AlertMarch 23, 2022
30% of Log4j instances remain vulnerable to exploitation
MyTechDecisionsApril 3, 2022
Qualys leverages cloud platform to help security teams reduce alert fatigue
SC MediaMarch 22, 2022
30% of Apache Log4j Security Holes Remain Unpatched
The New StackMarch 20, 2022
Qualys platform study: Log4Shell, the menace continues
Help Net SecurityMarch 17, 2022
30% of Log4j instances still remain vulnerable, with open source apps a major hurdle
SC MediaMarch 9, 2022
Over 40% of Log4j Downloads Are Vulnerable Versions of the Software
Dark ReadingMarch 7, 2022
Mandiant reminds us: Don’t forget about Log4j
VentureBeatMarch 7, 2022
Chinese hacking groups target US and European governments
Silicon AngleFebruary 28, 2022
Infosec products of the month: February 2022
Help Net SecurityFebruary 27, 2022
CISA, FBI warn US orgs of WhisperGate and HermeticWiper malware
ZDNet.comFebruary 23, 2022
WTF…Can You Do about Software Supply Chain Attacks without Killing Open Source?
Container Solutions BlogFebruary 21, 2022
Linux Snap package tool fixes make-me-root bugs
The RegisterFebruary 15, 2022
Linux tops Google's Project Zero charts for fastest bug fixes
The RegisterFebruary 15, 2022
Qualys Context XDR: Bringing context to an organization’s security efforts
Help Net SecurityJanuary 28, 2022
Repelling A Ransomware Attack: Paul Baird of Qualys On The 5 Things You Need To Do To Protect Yourself Or Your Business From A Ransomware Attack
Authority MagazineJanuary 27, 2022
This easily exploitable bug affects all Linux distros
TechRadarJanuary 27, 2022
Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
Dark ReadingJanuary 26, 2022
A bug lurking for 12 years gives attackers root on every major Linux distro
Ars TechnicaJanuary 26, 2022
Linux distros haunted by Polkit-geist for 12+ years: Bug grants root access to any user
The RegisterJanuary 25, 2022
Linux system service bug gives root on all major distros, exploit released
Bleeping ComputerJanuary 25, 2022
Major Linux PolicyKit security vulnerability uncovered: Pwnkit
ZDNet.comJanuary 25, 2022
TechCrunch+ roundup: Zero-day exploits, breaking into Japan, algorithmic VC investing
TechCrunchJanuary 25, 2022
Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say
VentureBeatJanuary 25, 2022
Major attacks using Log4j vulnerability ‘lower than expected’
VentureBeatJanuary 25, 2022
A CISO’s playbook for responding to zero-day exploits
TechCrunchJanuary 19, 2022
Microsoft & Adobe Patch Tuesday (January 2022) – Microsoft 126 Vulnerabilities with 9 Critical, Adobe 41 Vulnerabilities, 22 critical
Cybersecurity AseanFollow us on social media