Please turn JavaScript on
header-image

Qualys Security Blog

Subscribe to Qualys Security Blog’s news feed.

Click on “Follow” and decide if you want to get news from Qualys Security Blog via RSS, as email newsletter, via mobile or on your personal news page.

Subscription to Qualys Security Blog comes without risk as you can unsubscribe instantly at any time.

You can also filter the feed to your needs via topics and keywords so that you only receive the news from Qualys Security Blog which you are really interested in. Click on the blue “Filter” button below to get started.

Website title: Qualys Security Blog | Expert network security guidance and news

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.37 / day

Message History

Unpatched vulnerabilities remain one of the largest drivers of cyber risk, accounting for nearly 60% of cyber compromises. Modern security programs are therefore measured not only by how quickly they discover risk, but also by how efficiently they remediate...


Read full story

Key Takeaways

The mROC Portal acts as a portfolio-wide command center, giving partners unified visibility into high-risk customer environments, active threats, and critical exposures to drive prioritized, portfolio-wide risk management. Partners can filter risk, drill into any customer, and take action with one-click SSO on the mROC Portal, elimina...

Read full story

Peer benchmarks, exposure timing, and threat actor insight, orchestrated by agentic AI to turn TruRisk into decisions you can defend.

When we first outlined the idea of TruLens at ROCon Houston in 2025, it was a vision, one that imagined a future where a security leader could see their environment the way an adversary does: in context, in motion, and in comparison, ...


Read full story

The race most security programs are built around — patch faster than the attacker can exploit — was designed for a threat landscape that no longer exists. The data shows defenders are falling behind in the vast majority of cases. Across the most critical, actively weaponized vulnerabilities of the past four years, manual remediation processes failed to keep pace with atta...


Read full story
Executive Summary

The primary challenge in vulnerability management is proving what is actually exploitable. Many vulnerabilities are not exploited, but still drain resources. Traditional tools often fail to validate real risks. gent Val, within Qualys Enterprise TruRisk Management, delivers this through a closed-loop workflow of validate, mitigate, and revalidate...


Read full story