Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Growing Digital Ecosystems, Increasing Cybersecurity Risk, Fragmented Regulations and Economic Challenges Emphasizes Need for Holistic API Security
Why You Need Cyber Insurance and How to Obtain It
The Royal & BlackCat Ransomware: What you Need to Know
A Brief Introduction to the World of IP Addresses
How to Secure Your SCM Repositories with GitGuardian Honeytokens
API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods
30+ Password Statistics - An Analysis of Password Trends in Cybersecurity
Former Tesla Employee Takes 100 GB of Confidential Data in Serious Data Breach
CIS Critical Security Control 4 Explained
Digital Transformation Is a Major Driver of Network Transformation
The Ultimate Guide to Digital Footprinting: How to Use Email Risk Profiling for Digital Identity Verification
5 Guiding Principles to protect your IP effectively with Zero Trust
Ultimate Security Checklist to Launch a Mobile App in Bahrain - iOS & Android
How to avoid burnout in your cybersecurity team?
Malvertising: How Phishing Campaigns Use Malicious Ads
Securing the Software Supply Chain: Protecting Against Insecure Code Downloads
Breaking
Featured Posts
Growing Digital Ecosystems, Increasing Cybersecurity Risk, Fragmented Regulations and Economic Challenges Emphasizes Need for Holistic API Security
May 30, 2023
In
Noname Security
GDPR - the benchmark for a global privacy framework
May 25, 2023
In
Protegrity
Cyber Warfare and Government Attitudes To Cybersecurity
May 19, 2023
In
SafeBreach
Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response
May 19, 2023
In
ThreatQuotient
Sponsored By CYBRIANT
The CIOs Guide to Preventing Ransomware Attacks
May 16, 2023
In
Cybriant
Password Managers: Here to stay?
May 3, 2023
In
One Identity
Sponsored By KONDUKTO
How To Get Developer Buy-In For AppSec Programs
Apr 24, 2023
In
Kondukto
5 best practices for imaging hard drives
Apr 21, 2023
In
ManageEngine
More Posts
Latest News
Trustwave DbProtect and MailMarshal Named Finalists for SC Media and SC Europe Awards
May 25, 2023
In
Trustwave
Elastic Security 8.8: Powerful endpoint response, alert triage, and data accuracy to bring more efficiency to security
May 25, 2023
In
Elastic
CISO Global and Ransomware Pioneer Halcyon Join Forces
May 24, 2023
In
CISO Global
Mergers don't have to be a nightmare for IT teams
May 24, 2023
In
Forward Networks
Thales Builds Europe's Largest Cyber Threat Intelligence Service with ThreatQuotient
May 23, 2023
In
ThreatQuotient
Snyk named a Leader in 2023 Gartner Magic Quadrant for Application Security Testing
May 23, 2023
In
Snyk
Synopsys named a Leader in the 2023 Gartner Magic Quadrant for Application Security Testing for the seventh year
May 23, 2023
In
Synopsys
Improved risk assessment with EPSS scores in Snyk
May 22, 2023
In
Snyk
A New Era of AppSec: 10 Times as a Leader in Gartner Magic Quadrant for Application Security Testing
May 22, 2023
In
Veracode
Teleport Team
May 19, 2023
In
Teleport
Introducing Passage by 1Password - the simple way to add passkey support to your app or website
May 18, 2023
In
1Password
Announcing Cloudflare Secrets Store
May 18, 2023
In
Cloudflare
CrowdStrike Named a Leader with "Exceptional" MDR Service: 2023 Forrester Wave for MDR
May 18, 2023
In
CrowdStrike
MeriTalk Honors TGS President Bill Rucker with Prestigious 2023 Cyber Defenders Award
May 18, 2023
In
Trustwave
More News
Latest Blogs
5 Guiding Principles to protect your IP effectively with Zero Trust
May 29, 2023
In
SECUDE
Ultimate Security Checklist to Launch a Mobile App in Bahrain - iOS & Android
May 29, 2023
In
Appknox
How to avoid burnout in your cybersecurity team?
May 29, 2023
In
WatchGuard
Why You Need Cyber Insurance and How to Obtain It
May 29, 2023
In
Arctic Wolf
The Royal & BlackCat Ransomware: What you Need to Know
May 29, 2023
In
Tripwire
A Brief Introduction to the World of IP Addresses
May 29, 2023
In
Tripwire
How to Secure Your SCM Repositories with GitGuardian Honeytokens
May 29, 2023
In
GitGuardian
API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods
May 29, 2023
In
Indusface
30+ Password Statistics - An Analysis of Password Trends in Cybersecurity
May 29, 2023
In
Astra
Former Tesla Employee Takes 100 GB of Confidential Data in Serious Data Breach
May 29, 2023
In
IDStrong
CIS Critical Security Control 4 Explained
May 29, 2023
In
CalCom
The Ultimate Guide to Digital Footprinting: How to Use Email Risk Profiling for Digital Identity Verification
May 29, 2023
In
IDcentral
Digital Transformation Is a Major Driver of Network Transformation
May 29, 2023
In
Cato Networks
Malvertising: How Phishing Campaigns Use Malicious Ads
May 28, 2023
In
Cyberint
Securing the Software Supply Chain: Protecting Against Insecure Code Downloads
May 27, 2023
In
Veracode
Thousands of Students and Faculty Exposed in Bristol Community College Data Breach
May 26, 2023
In
IDStrong
Minimizing public sector cybersecurity risk
May 26, 2023
In
SecurityScorecard
Weekly Cybersecurity Recap May 26
May 26, 2023
In
IDStrong
Top 7 AWS Vulnerability Scanners in 2023
May 26, 2023
In
Astra
Enhancing Mobile Device Security: Applying the NIS2 Directive
May 26, 2023
In
Lookout
More Blogs
Upcoming Events
Latest Customer Stories
Improved Security Without Adding Friction - Aspen Skiing Company + Netskope
May 26, 2023
In
Netskope
Case study: Calico on AWS enables turnkey networking and security for Rafay's enterprise-grade Kubernetes Operations Platform
May 26, 2023
In
Tigera
Bureau Veritas mitigates risk with OneLogin
May 24, 2023
In
One Identity
A TrustCloud Trustimonial: Sevco Security
May 23, 2023
In
TrustCloud
Case study: Calico Enterprise empowers Aldagi to achieve EU GDPR compliance
May 18, 2023
In
Tigera
Identity security and zero trust at Volksbank
May 11, 2023
In
One Identity
Protecting all your data with identity governance
May 11, 2023
In
One Identity
Netskope Protects APIs from Hackers with Noname Security
May 9, 2023
In
Noname Security
Zenity Helps Microsoft Identify and Remediate Critical Security Risk in Power Automate Desktop
May 8, 2023
In
Zenity
How Ulta protects their identities
May 2, 2023
In
One Identity
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.