Please turn JavaScript on
header-image

Qualys Security Blog

Subscribe to Qualys Security Blog’s news feed.

Click on “Follow” and decide if you want to get news from Qualys Security Blog via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Qualys Security Blog comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Qualys Security Blog which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Qualys Security Blog | Expert network security guidance and news

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  1.92 / week

Message History

Key Takeaways

Pulling container images from public registries is a trust decision, not a neutral operational step. The impact extends to infrastructure stability, cloud spend, and security risk. Cryptomining is the most common form of malicious abuse in public container images, driven by the ease of distribution and...


Read full story

We’re proud to share that Qualys has been recognized as a Leader and Outperformer in the 2025 GigaOm Radar Report for Cloud-Native Application Protection Platforms (CNAPP).

This year’s ev...


Read full story

Key Takeaways Cyber risk management gets operationalized in 2026. Leading organizations move beyond visibility and frameworks to govern risk through prioritization, simulation, and deliberate action. Attack-path modeling matures into execution. Static views give way to dynamic, decision-driving models that help teams focus on the attack p...


Read full story

Security Teams Rarely Stop to Reflect

When a security program is working well, very little seems to happen. That is by design. There is no alert for the incident that was prevented. No visibility into the attack path that was quietly closed. No recognition for the vulnerability that was fixed before it could be exploited.

For CISOs and security l...


Read full story

Key Takeaways

Serverless shifts security risk from infrastructure to identity, permissions, and configuration, where small design choices can have an outsized impact. Short-lived cloud credentials reduce persistence but remain powerful; when exposed, they enable authenticated access, escalation, and lateral movement. The most damaging ser...


Read full story