Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
Bluesky
GitHub
DORA Is Here - But Readiness Concerns Are Far from Over
WatchGuard Joins AWS ISV Accelerate Program and Announces Availability in AWS Marketplace
Top tips: How not to let dark data become a silent threat to your organization
Role-based access control: Your organization's defense against cyberthreats
Malvertising: Phishing Edition
WatchGuard Joins AWS ISV Accelerate Program and Launches on AWS Marketplace
Digital Shoplifting: Understanding and Combating Online Retail Fraud
Who Owns Vulnerabilities?
NIS2 Compliance in 2025: Compliance Doesn't Have to Mean Complexity
Consolidate Security Findings with Snyk and Google Security Command Center
Improving Kubernetes Security: Lessons from an Istio Configuration Finding
Warning: Organizations Need to Prep For AI-Powered Ransomware Attacks
Year of the Snake, Year of the Institution: The Fireblocks 2025 Digital Assets Policy Outlook
Make-Shift Brand Impersonation: Abusing Trusted Domains with Open Redirects
Introducing the new 1Password Community
Communicating Cyber Risk at the Board Level: 7 Lessons for 2025
Overcoming 4 Challenges with Client Onboarding in Financial Services
How CISOs Can Build a Cybersecurity-First Culture
IT Asset Management or Inventory System: Better Together?
2025 OWASP Top 10 for LLM Applications: A Quick Guide
Breaking
Featured Posts
DORA Is Here - But Readiness Concerns Are Far from Over
Feb 6, 2025
In
Protegrity
The Core Pillars of Cyber Resiliency
Feb 4, 2025
In
11:11 Systems
Data Protection Day 2025: insights from experts
Jan 28, 2025
In
SecuritySenses
Taking a Threat Adapted Approach to Vulnerability Management
Jan 22, 2025
In
ThreatQuotient
Understanding Task Automation: All You Need to Know
Jan 17, 2025
In
SecuritySenses
Dumb ways to risk a data breach
Jan 15, 2025
In
Snyk
2025 Predictions - Navigating Through the Challenges and Opportunities Ahead
Jan 9, 2025
In
Protegrity
Sponsored By EVENTSENTRY
Capturing Network Traffic anytime
Jan 1, 2025
In
EventSentry
More Posts
Latest News
WatchGuard Joins AWS ISV Accelerate Program and Announces Availability in AWS Marketplace
Feb 6, 2025
In
WatchGuard
INETCO recognized in the 2024 Gartner Market Guide for Fraud Detection in Banking Payments
Feb 5, 2025
In
INETCO
SpyCloud Pioneers the Shift to Holistic Identity Threat Protection
Feb 4, 2025
Astra Security Raises Funding to Simplify Cybersecurity with AI-driven Pentesting!
Feb 4, 2025
In
Astra
Caught in the Act: CrowdStrike's New ML-Powered LDAP Reconnaissance Detections
Feb 4, 2025
In
CrowdStrike
Cloudflare launches One-Click content credentials to track image authenticity and preserve creator attribution
Feb 3, 2025
In
Cloudflare
Advanced container registry scanning is now available in ARMO!
Feb 3, 2025
In
ARMO
The Aurora Endpoint Security Difference: Ushering in a New Dawn for Cybersecurity
Feb 3, 2025
In
Arctic Wolf
Cybriant announces ComplyCORE: A Compliance Management System
Feb 1, 2025
In
Cybriant
ThreatQuotient and Ask Sage Partner to Assist Governments in Achieving Cybersecurity Efficiencies
Jan 30, 2025
In
ThreatQuotient
SquareX Discloses "Browser Syncjacking" , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk
Jan 30, 2025
Doppler announces integration with Datadog to streamline security and monitoring
Jan 30, 2025
JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security
Jan 29, 2025
In
JumpCloud
Cyberhaven Launches Cyberhaven for AI, the Industry's First Complete Solution to Secure Enterprise AI Usage and Combat "Shadow AI" Risks
Jan 28, 2025
In
Cyberhaven
More News
Latest Blogs
Top tips: How not to let dark data become a silent threat to your organization
Feb 6, 2025
In
ManageEngine
Role-based access control: Your organization's defense against cyberthreats
Feb 6, 2025
In
ManageEngine
Malvertising: Phishing Edition
Feb 6, 2025
In
Sedara
The Dark Side of AI: How Cybercriminals Exploit Generative AI for Attacks
Feb 6, 2025
In
Foresiet
Warning: Organizations Need to Prep For AI-Powered Ransomware Attacks
Feb 6, 2025
In
KnowBe4
Digital Shoplifting: Understanding and Combating Online Retail Fraud
Feb 6, 2025
In
Netacea
Seamless Migration from RKE to RKE2 with CloudCasa - A SUSE Partner Solution
Feb 6, 2025
In
CloudCasa
Make-Shift Brand Impersonation: Abusing Trusted Domains with Open Redirects
Feb 6, 2025
In
KnowBe4
Ranking Regulatory Frameworks
Feb 6, 2025
In
Riscosity
Communicating Cyber Risk at the Board Level: 7 Lessons for 2025
Feb 6, 2025
In
Kovrr
How CISOs Can Build a Cybersecurity-First Culture
Feb 6, 2025
In
Tripwire
NIS2 Compliance in 2025: Compliance Doesn't Have to Mean Complexity
Feb 6, 2025
In
JFrog
2025 OWASP Top 10 for LLM Applications: A Quick Guide
Feb 6, 2025
In
Mend
Improving Kubernetes Security: Lessons from an Istio Configuration Finding
Feb 6, 2025
In
CrowdStrike
Fake VS Code Extension on npm Spreads Multi-Stage Malware
Feb 6, 2025
In
Mend
Year of the Snake, Year of the Institution: The Fireblocks 2025 Digital Assets Policy Outlook
Feb 6, 2025
In
Fireblocks
WatchGuard Joins AWS ISV Accelerate Program and Launches on AWS Marketplace
Feb 6, 2025
In
WatchGuard
Introducing the new 1Password Community
Feb 6, 2025
In
1Password
Who Owns Vulnerabilities?
Feb 6, 2025
In
Nucleus
Overcoming 4 Challenges with Client Onboarding in Financial Services
Feb 6, 2025
In
Egnyte
More Blogs
Upcoming Events
Latest Customer Stories
Carlsberg Group raises the bar on network performance with the Cato SASE Cloud Platform
Jan 21, 2025
In
Cato Networks
Neo4j: Building a Secure Future with Sysdig CNAPP
Jan 14, 2025
In
Sysdig
Yahoo's AppSec Journey: Scaling Security with Mend.io
Jan 14, 2025
In
Mend
Managing identities in a growing organization: Lessons from SECURA Insurance
Jan 6, 2025
In
One Identity
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
How ARMO Reduced Secrets Exposure with GitGuardian
Nov 12, 2024
In
GitGuardian
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.