USA media coverage.
-
December 23, 2022
CSPM evolution – start secure, stay secure
SC Media
-
December 22, 2022
How to improve workload security
SC Media
-
December 19, 2022
How to strengthen your multi-cloud security posture
SC Media
-
December 15, 2022
Simplifying Cloud Security – Terry Barber, Parag Bajaria
SC Media
-
December 14, 2022
Scanning assets in the cloud: Challenges and improvements to make
SC Media
-
December 5, 2022
Top 10 risk-based vulnerability management (VM) tools for 2022
VentureBeat
-
December 5, 2022
More than 150 Oracle Access Management systems exposed to bug highlighted by CISA
The Record
-
December 1, 2022
Infosec products of the month: November 2022
Help Net Security
-
November 22, 2022
Qualys QSC Wrap-Up: Risk and Simplicity
Security Boulevard
-
November 19, 2022
Simplifying cloud native security for posture management and AppSec
SC Media
-
November 11, 2022
VMDR: What it is, and how it fits into cloud-native infrastructure and applications
SC Media
-
November 10, 2022
ProxyNotShell Finally Gets Patched by Microsoft
E Security Planet
-
November 10, 2022
Microsoft releases patches for 68 vulnerabilities, including ‘ProxyNotShell’ zero-days
The Record
-
November 9, 2022
November Patch Tuesday: Microsoft Finally Patches Two NotProxyShell And Four Other Zero-day Flaws
Spiceworks
-
November 9, 2022
Microsoft Quashes Bevy of Actively Exploited Zero-Days for November Patch Tuesday
Dark Reading
-
November 7, 2022
Cybersecurity M&A Roundup: 39 Deals Announced in October 2022
SecurityWeek
-
November 4, 2022
New infosec products of the week: November 4, 2022
Help Net Security
-
November 4, 2022
Qualys previews TotalCloud FlexScan for multicloud security management
CSO Online
-
November 1, 2022
Nontraditional applicants could be answer to talent shortage as cybersecurity market projected to reach $2T
Fortune
-
November 1, 2022
OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities
The Hacker News
-
November 1, 2022
Qualys Introduces TotalCloud with FlexScan Delivering Cloud-Native VMDR
VMblog
-
November 1, 2022
Qualys TotalCloud with FlexScan helps enterprises strengthen cloud-native security
Help Net Security
-
October 21, 2022
Experts on securing the public cloud
SC Media
-
October 17, 2022
Cybersecurity M&A Roundup for October 1-15, 2022
Security Week
-
October 14, 2022
Concerns Over Fortinet Flaw Mount; PoC Released, Exploit Activity Grows
Dark Reading
-
October 13, 2022
‘Critical’ vulnerability found in Siemens industrial tool, allowing theft of cryptographic keys
The Record
-
October 12, 2022
October Patch Tuesday: Two Zero-day and 15 Critical Vulnerabilities Patched by Microsoft
Spiceworks
-
October 12, 2022
https://www.esecurityplanet.com/threats/microsoft-patch-tuesday-leaves-proxynotshell-exposed/
eSecurity Planet
-
October 12, 2022
Millions of PCs branded dangerous as Microsoft warns users to act now
The Sun
-
October 10, 2022
Qualys Acquires Blue Hexagon’s AI/Machine Learning Platform
AiThority
-
October 5, 2022
Qualys Acquires Blue Hexagon’s AI/Machine Learning Platform
ITechnology Series
-
October 5, 2022
Qualys Buys Blue Hexagon, Adds AI, ML Capabilities to Cloud Platform
MSSP Alert
-
October 4, 2022
State-Sponsored Hackers Likely Targeted 10 Organizations With M.S. Exchange 0-Day Exploits
Gaming Ideology
-
October 4, 2022
CISA Releases Directives On Asset Discovery And Vulnerability Enumeration
Forrester
-
October 4, 2022
Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree
The Register
-
October 4, 2022
Qualys Buys Blue Hexagon to Aid Secure Public Cloud Adoption
Bank Info Security
-
October 3, 2022
October Product Update
Security Boulevard
-
October 3, 2022
11 old software bugs that took way too long to squash
CSO
-
October 3, 2022
Microsoft confirms hackers are actively exploiting Exchange zero-day flaws
VentureBeat
-
October 1, 2022
State-Sponsored Hackers Likely Exploited MS Exchange 0-Days Against ~10 Organizations
The Hacker News
-
September 30, 2022
Iran and Cybersecurity: What Technologists Need to Know
Dice Insights
-
September 30, 2022
Microsoft is rushing to patch new zero-day Exchange vulnerabilities
Protocol
-
September 30, 2022
Fix for two Exchange zero-days on ‘accelerated timeline,’ says Microsoft
SC Media
-
September 29, 2022
Qualys Rings the Nasdaq Stock Market Closing Bell
NASDAQ
-
September 29, 2022
Why Cybersecurity Is Not Feeling the Economic Downturn as Compared to Other Companies
NASDAQ
-
September 29, 2022
Qualys (QLYS) CEO On Cloud Security & 10 Year Anniversary
TD Ameritrade
-
September 29, 2022
Researchers disclose new zero-day Microsoft Exchange vulnerability
Protocol
-
September 28, 2022
Leveraging automation in cybersecurity reduces workforce reliance, says Qualys president & CEO
CNBC
-
September 27, 2022
SC eBook preview: Top 5 public cloud infrastructure challenges
SC Media
-
September 21, 2022
Cloud security compliance checklist
SC Media
-
September 20, 2022
Maximizing Risk-Reduction in your Security Program – Paul Baird – BSW #277
SecurityWeekly
-
September 20, 2022
Most common SAP vulnerabilities attackers try to exploit
CSO
-
September 15, 2022
Implementing and managing cloud security compliance
SC Media
-
September 15, 2022
Cisco Won’t Fix Flaw in Routers, Citing End of Life
Security Boulevard
-
September 15, 2022
Unflagging Iranian Threat Activity Spurs Warnings, Indictments From US Government
Dark Reading
-
September 14, 2022
Microsoft fixes Windows security hole likely widely exploited by miscreants
The Register
-
September 14, 2022
Microsoft's Latest Security Update Fixes 64 New Flaws, Including a Zero-Day
The Hacker News
-
September 13, 2022
Microsoft's Latest Security Update Fixes 64 New Flaws, Including a Zero-Day
Dark Reading
-
September 12, 2022
Google Chrome, D-Link bugs among twelve added to CISA’s list of known exploited vulnerabilities
The Record
-
September 9, 2022
LockBit, ALPHV & Other Ransomware Gang Leak Sites Hit by DDoS Attacks
Dark Reading
-
September 9, 2022
AT&T outs new 'Shikitega' Linux malware
itnews
-
September 8, 2022
Dump these small-biz routers, says Cisco, because we won't patch their flawed VPN
The Register
-
September 6, 2022
Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor
SC Media
-
September 1, 2022
Infosec products of the month: August 2022
Help Net Security
-
August 30, 2022
Qualys Discovers Two Major Vulnerabilities – Techstrong TV
Security Boulevard
-
August 22, 2022
Qualys API best practices: Cybersecurity asset management API
SC Media
-
August 22, 2022
Best Vulnerability Management Solution | Qualys Vulnerability Management Detection and Response
SC Media
-
August 22, 2022
How Qualys Reduces Risk and Enables Tool Consolidation
Dark Reading
-
August 17, 2022
eSecurity Planet’s 2022 Cybersecurity Product Awards
eSecurity Planet
-
August 17, 2022
Qualys August 2022 – Patch Tuesday
Cybersecurity Asean
-
August 16, 2022
Qualys Joins the Big Leagues in Attack Surface Management
IDC
-
August 16, 2022
Sumedh Thakar on Fusing Vulnerability and Patch Management
Bank Info Security
-
August 10, 2022
The challenges of managing the modern external attack surface
Help Net Security
-
August 4, 2022
Qualys Brings External Attack Surface Management (EASM) to the Qualys Cloud Platform
AiThority
-
August 4, 2022
Qualys CyberSecurity Asset Management 2.0 with EASM identifies unknown internet-facing assets
Help Net Security
-
August 3, 2022
How Qualys is moving channel partners to resell and go to market with cloud security
Global CIO Forum
-
August 3, 2022
Patch Management: An Important Service for MSPs and MSSPs
Channel Insider
-
August 3, 2022
Qualys adds EASM capabilities to its platform
ITopstimes
-
August 3, 2022
Qualys adds external attack management capability to cloud security platform
CSO
-
August 2, 2022
Cloud security automation is key to reducing time to remediate
SC Media
-
August 1, 2022
North Koreans Suspected of Using Fake Resumes to Steal Crypto
BNNBloomberg
-
August 1, 2022
North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam
Bloomberg
-
July 25, 2022
Automated vulnerability remediation: Making it work
SC Media
-
July 20, 2022
VMDR: Inside vulnerability management, detection and response
TechTarget
-
July 12, 2022
Cloud-native app protection platforms: what they are and what they bring to the table
SC Media
-
July 7, 2022
Hacking Linux is Easy with PwnKit Brittany Brittany Day 1 min read 284 07/05/2022
Linux Security
-
July 6, 2022
5 Channel Partner Program and MSP Market Updates: 06 July 2022
Channele2e
-
July 6, 2022
Managed Security Services Provider (MSSP) Market News: 06 July 2022
MSSP Alert
-
July 1, 2022
Infosec products of the month: June 2022
Help Net Security
-
June 30, 2022
Hacking Linux is Easy with PwnKit
eSecurity Planet
-
June 23, 2022
How to secure cloud environments by simplifying their complexity
VentureBeat
-
June 21, 2022
Everything You Need to Know About Web Application Penetration Testing Services
Hackernoon
-
June 17, 2022
Organizations prioritizing attacks that make headlines over other equally impactful incidents
Black Hat
-
June 16, 2022
Qualys’ new approach to reducing vulnerabilities and cyber risk
SC Media
-
June 14, 2022
Security in the Cloud Requires a New Mindset
Data Breach Today
-
June 14, 2022
Patch management vs. vulnerability management: Key differences
TechTarget
-
June 12, 2022
Week in review: Follina exploit delivers Qbot malware, Patch Tuesday forecast, RSAC 2022
Help Net Security
-
June 10, 2022
New infosec products of the week: June 10, 2022
Help Net Security
-
June 7, 2022
Qualys upgrades vulnerability management solution
CSO Online
-
June 7, 2022
RSA Conference 2022 - Announcements Summary (Day 1)
Security Week
-
June 6, 2022
Qualys Launches VMDR 2.0 with TruRisk Scores and Automated Remediation Workflows
VMblog
-
June 6, 2022
Qualys launches VMDR 2.0 with TruRisk scoring
ITopstimes
-
June 6, 2022
Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level
Help Net Security
-
June 6, 2022
Qualys VMDR 2.0 provides security teams with insights into an organization’s risk posture
Help Net Security
-
June 6, 2022
New Qualys VMDR 2.0 delivers insights into risk posture
SiliconANGLE
-
June 6, 2022
Qualys Adds Risk Assessment to Cloud Security Platform
Security Boulevard
-
June 1, 2022
Infosec products of the month: May 2022
Help Net Security
-
May 31, 2022
Cops' Killer Bee stings credential-stealing scammer
The Register
-
May 30, 2022
Linux malware is on the rise—6 types of attacks to look for
CSO
-
May 25, 2022
Qualys to Unveil VMDR 2.0 at Qualys Security Conference in San Francisco
Dark Reading
-
May 24, 2022
Automated Vulnerability Scanning Tools: What, Why, and How
SNN News
-
May 22, 2022
Qualys Launches Enhanced Partner Program
Channel Impact
-
May 18, 2022
Qualys launches new solution for remediating threats efficiently
ITopstimes
-
May 18, 2022
Qualys Adds Custom Assessment and Remediation to its Cloud Platform
VMblog
-
May 18, 2022
Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks
Help Net Security
-
May 17, 2022
Qualys Adds Custom Assessment and Remediation to Its Cloud Platform
Dark Reading
-
May 17, 2022
3 Best Free Online Tools to Scan Website Security Vulnerabilities & Malware
Elist10
-
May 6, 2022
Qualys Launches Enhanced Partner Program to Drive Further Growth and Enable Customer Success
AiThority
-
May 3, 2022
Qualys Unveils Enhanced Partner Program with More Benefits, Protection
Channel Futures
-
May 3, 2022
Qualys MSSPs, MSPs Gain Channel Partner Program Updates
MSSP Alert
-
April 29, 2022
Don’t expect to get your data back from the Onyx ransomware group
The Register
-
April 28, 2022
Five Eyes nations reveal 2021's fifteen most-exploited flaws
The Register
-
April 20, 2022
Endpoint Detection and Response: The Must-Have Features
Data Breach Today
-
April 14, 2022
Apache says Struts 2 security bug wasn't fully fixed in 2020
The Register
-
April 14, 2022
AppOmni, DoControl focus on managing security across SaaS apps
SC Media
-
April 13, 2022
Patch Tues: Microsoft Releases Fixes for 145 Vulnerabilities
Bank Info Security
-
April 5, 2022
Managed Security Services Provider (MSSP) News: 05 April 2022
MSSP Alert
-
April 4, 2022
Qualys leverages cloud platform to help security teams reduce alert fatigue
SC Media
-
March 24, 2022
30% of Log4j instances remain vulnerable to exploitation
MyTechDecisions
-
March 23, 2022
30% of Apache Log4j Security Holes Remain Unpatched
The New Stack
-
March 21, 2022
Qualys platform study: Log4Shell, the menace continues
Help Net Security
-
March 18, 2022
30% of Log4j instances still remain vulnerable, with open source apps a major hurdle
SC Media
-
March 10, 2022
Over 40% of Log4j Downloads Are Vulnerable Versions of the Software
Dark Reading
-
March 8, 2022
Mandiant reminds us: Don’t forget about Log4j
VentureBeat
-
March 8, 2022
Chinese hacking groups target US and European governments
Silicon Angle
-
March 1, 2022
Infosec products of the month: February 2022
Help Net Security
-
February 28, 2022
CISA, FBI warn US orgs of WhisperGate and HermeticWiper malware
ZDNet.com
-
February 24, 2022
WTF…Can You Do about Software Supply Chain Attacks without Killing Open Source?
Container Solutions Blog
-
February 21, 2022
Linux Snap package tool fixes make-me-root bugs
The Register
-
February 15, 2022
Linux tops Google's Project Zero charts for fastest bug fixes
The Register
-
February 15, 2022
Qualys Context XDR: Bringing context to an organization’s security efforts
Help Net Security
-
January 28, 2022
Repelling A Ransomware Attack: Paul Baird of Qualys On The 5 Things You Need To Do To Protect Yourself Or Your Business From A Ransomware Attack
Authority Magazine
-
January 27, 2022
This easily exploitable bug affects all Linux distros
TechRadar
-
January 27, 2022
Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
Dark Reading
-
January 26, 2022
A bug lurking for 12 years gives attackers root on every major Linux distro
Ars Technica
-
January 26, 2022
Linux distros haunted by Polkit-geist for 12+ years: Bug grants root access to any user
The Register
-
January 25, 2022
Linux system service bug gives root on all major distros, exploit released
Bleeping Computer
-
January 25, 2022
Major Linux PolicyKit security vulnerability uncovered: Pwnkit
ZDNet.com
-
January 25, 2022
TechCrunch+ roundup: Zero-day exploits, breaking into Japan, algorithmic VC investing
TechCrunch
-
January 25, 2022
Linux vulnerability can be ‘easily exploited’ for local privilege escalation, researchers say
VentureBeat
-
January 25, 2022
Major attacks using Log4j vulnerability ‘lower than expected’
VentureBeat
-
January 25, 2022
A CISO’s playbook for responding to zero-day exploits
TechCrunch
-
January 19, 2022
Microsoft & Adobe Patch Tuesday (January 2022) – Microsoft 126 Vulnerabilities with 9 Critical, Adobe 41 Vulnerabilities, 22 critical
Cybersecurity Asean