Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
Bluesky
GitHub
New cybersecurity threat-focused reports from ENISA
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
The Tron Ledger: Revolutionizing how we access entertainment and content sharing
Budgeting and Forecasting: Your Roadmap to Financial Resilience
IEEE 802.3bt - Making Device Management in Smart Buildings Better
CVSS 3.1 vs CVSS 4.0: A Look at the Data
Single sign-on (SSO), simplify access and protect your business
How to Install VMware Tools on Linux, Windows, MacOS, FreeBSD and Solaris
New in Vanta | January 2025
Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown
Ransomware Annual Report 2024
CISO predictions: What does 2025 hold for attack surface management (ASM)?
Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks
Is Facebook Marketplace Really Safe? Find Out
Endpoint Management: Best Practices to Secure Every Device Across Your Network
Emerging Threat: Ivanti Connect Secure CVE-2025-0282 and CVE-2025-0283
The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses
What Is Vulnerability Management?
Create Instant, Scalable, and Cost-Effective Value for MSSP Customers
Dealing with Modern Cloud Servers for Business: Top Tips to Stay Secure
Breaking
Featured Posts
2025 Predictions - Navigating Through the Challenges and Opportunities Ahead
Jan 9, 2025
In
Protegrity
Sponsored By EVENTSENTRY
Capturing Network Traffic anytime
Jan 1, 2025
In
EventSentry
Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility
Dec 18, 2024
In
ThreatQuotient
The Key Steps to Ensuring DORA Compliance
Dec 13, 2024
In
Protegrity
2025 - A Year of Perpetual Change
Dec 6, 2024
In
JumpCloud
The Role of Data Security in Protecting Sensitive Information Across the Finance Industry
Nov 30, 2024
In
Protegrity
The Role of Data Recovery in Cyber Resilience
Nov 19, 2024
In
11:11 Systems
Building a Modern Identity Capability to Tackle DORA
Nov 13, 2024
In
JumpCloud
More Posts
Latest News
Code Intelligence Launches Spark, Its AI Test Agent That Autonomously Uncovers Vulnerabilities Without Human Interaction
Jan 9, 2025
In
Code Intelligence
WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
Jan 7, 2025
Security Risk Advisors joins the Microsoft Intelligent Security Association
Jan 7, 2025
Egnyte Wins Big With Nine Comparably Awards in 2024
Jan 7, 2025
In
Egnyte
Feature Announcement: Enhancing ARMO Platform's Threat Detection and Response
Jan 7, 2025
In
ARMO
1Password acquires Trelica, a trailblazer in SaaS access management
Jan 7, 2025
In
1Password
Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis
Jan 6, 2025
In
Veracode
Sysdig is recognized as a Customers' Choice in Gartner Voice of the Customer for Cloud-Native Application Protection Platforms
Jan 6, 2025
In
Sysdig
SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
Dec 30, 2024
First ever Magic Quadrant for Email Security Platforms by Gartner
Dec 19, 2024
In
Egress
CrowdStrike Earns AAA Award, 100% Total Accuracy Score in SE Labs Q3 Enterprise Advanced Security Test
Dec 18, 2024
In
CrowdStrike
CrowdStrike Named a Leader in 2024 GigaOm Radar for Container Security
Dec 18, 2024
In
CrowdStrike
More News
Latest Blogs
New cybersecurity threat-focused reports from ENISA
Jan 15, 2025
In
Obrela
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
Jan 14, 2025
In
SecurityScorecard
The Tron Ledger: Revolutionizing how we access entertainment and content sharing
Jan 14, 2025
In
SecuritySenses
Budgeting and Forecasting: Your Roadmap to Financial Resilience
Jan 14, 2025
In
SecuritySenses
IEEE 802.3bt - Making Device Management in Smart Buildings Better
Jan 14, 2025
In
SecuritySenses
New in Vanta | January 2025
Jan 13, 2025
In
Vanta
Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks
Jan 13, 2025
In
Fidelis Security
Is Facebook Marketplace Really Safe? Find Out
Jan 13, 2025
In
SafeAeon
Endpoint Management: Best Practices to Secure Every Device Across Your Network
Jan 13, 2025
In
SafeAeon
Emerging Threat: Ivanti Connect Secure CVE-2025-0282 and CVE-2025-0283
Jan 13, 2025
In
CyCognito
The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses
Jan 13, 2025
In
Tripwire
What Is Vulnerability Management?
Jan 13, 2025
In
Tripwire
Create Instant, Scalable, and Cost-Effective Value for MSSP Customers
Jan 13, 2025
In
LimaCharlie
CVSS 3.1 vs CVSS 4.0: A Look at the Data
Jan 13, 2025
In
Mend
Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown
Jan 13, 2025
In
KnowBe4
Single sign-on (SSO), simplify access and protect your business
Jan 13, 2025
In
WatchGuard
How to Install VMware Tools on Linux, Windows, MacOS, FreeBSD and Solaris
Jan 13, 2025
In
NAKIVO
Ransomware Annual Report 2024
Jan 13, 2025
In
Cyberint
CISO predictions: What does 2025 hold for attack surface management (ASM)?
Jan 13, 2025
In
Outpost 24
Dealing with Modern Cloud Servers for Business: Top Tips to Stay Secure
Jan 13, 2025
In
SecuritySenses
More Blogs
Upcoming Events
Latest Customer Stories
Managing identities in a growing organization: Lessons from SECURA Insurance
Jan 6, 2025
In
One Identity
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
How ARMO Reduced Secrets Exposure with GitGuardian
Nov 12, 2024
In
GitGuardian
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
How Investronaut Secured Digital Transformation with CyberArk Identity Solutions | CyberArk
Sep 23, 2024
In
CyberArk
JP | Customer Corner: "How BigCommerce Achieved Real-Time Cloud Security"
Sep 13, 2024
In
Sysdig
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.