Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Understanding Regulatory Compliance in Group Accommodation
Is Your Image Editing Software Putting Your Cybersecurity at Risk?
The Intersection of Cybersecurity and Cloud Contact Centers: Best Practices for Data Protection
Top Four Benefits of Remote Browser Isolation
Are Cyber Attacks Increasing?
SafeBreach Coverage for AA24-249A (GRU Unit 29155)
Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection
What security lessons can you learn from your attack surface score?
Boost Sales Productivity with Egnyte and Zoho CRM for Document Management
Anatomy of a Centralized Exchanges Attack
The Sky-High Dangers of Impersonation Fraud in Airlines' Websites
The file table: osquery's secret weapon
How Popular Malware Is Stealing Credentials and What You Can Do About It
The business guide to ISO 27001 compliance and certification
Why Standard Approaches to Cloud Data Security Fall Short
5 Steps to Send An Encrypted Email in Gmail
3 Essential Capabilities for Modern Cloud Data Protection
Understanding FSMO Roles in Active Directory
Secret Leaks: The Predominant Issue in Software Supply Chain Security
Evolution of Scalper Bots Part 3: Expansion into New Markets
Breaking
Featured Posts
How Organisations Can Master Incident Reporting Obligations Under NIS2
Sep 5, 2024
In
BlueVoyant
A Lack of Resources and Talent Leaves UK SMEs Dangerously Exposed
Sep 4, 2024
In
JumpCloud
Why Shadow IT Prevails for UK SMEs
Aug 7, 2024
In
JumpCloud
Responsible Cloud Migration - Overcoming the Data Security Challenge
Aug 6, 2024
In
Protegrity
Sponsored By EVENTSENTRY
Can the EventSentry Agents cause the same outage & disruption like the CrowdStrike Falcon sensor did?
Jul 25, 2024
In
EventSentry
Why regulation is the cornerstone of AI development
Jul 2, 2024
In
Vanta
Six steps to protecting data in financial services companies
Jun 27, 2024
In
Protegrity
Balancing Large Language Model Adoption With Robust API Security
Jun 24, 2024
In
Noname Security
More Posts
Latest News
Vanta Delivers: Introducing New Products for the Future of Governance, Risk and Compliance (GRC)
Sep 5, 2024
In
Vanta
Code Intelligence Appoints Dr. Eric Brüggemann as CEO as Company Continues to Grow at Scale
Sep 5, 2024
In
Code Intelligence
Silobreaker expands US reseller programme with ThreatQuotient
Sep 5, 2024
In
ThreatQuotient
GRC Group Acquires Pentest People
Sep 5, 2024
In
Pentest People
Trustwave Named Frost & Sullivan Company of the Year
Sep 5, 2024
In
Trustwave
Keeper Named Value Leader by EMA for Privileged Access Management
Sep 4, 2024
In
Keeper
Introducing the Mend AppSec Platform
Sep 3, 2024
In
Mend
NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles
Sep 3, 2024
In
ARMO
Nightfall AI selected as 2024 SC Awards Finalist
Aug 30, 2024
In
Nightfall
CrowdStrike Named a Leader in Frost & Sullivan CWPP Radar, Demonstrating Strong Innovation and Growth
Aug 29, 2024
In
CrowdStrike
Trustwave Named the Innovation Leader by Frost & Sullivan for the Americas and Europe
Aug 28, 2024
In
Trustwave
ThreatQuotient Launches ThreatQ Platform Availability in AWS Marketplace
Aug 27, 2024
In
ThreatQuotient
The Vision Leading to Check Point's Acquisition of Cyberint
Aug 27, 2024
In
Cyberint
Optimizing Asset Management and Incident Response: CyCognito's New Integration with ServiceNow CMDB
Aug 21, 2024
In
CyCognito
More News
Latest Blogs
Is Your Image Editing Software Putting Your Cybersecurity at Risk?
Sep 7, 2024
In
SecuritySenses
The Intersection of Cybersecurity and Cloud Contact Centers: Best Practices for Data Protection
Sep 7, 2024
In
SecuritySenses
Understanding Regulatory Compliance in Group Accommodation
Sep 7, 2024
In
SecuritySenses
SafeBreach Coverage for AA24-249A (GRU Unit 29155)
Sep 6, 2024
In
SafeBreach
What security lessons can you learn from your attack surface score?
Sep 6, 2024
In
Outpost 24
Why Standard Approaches to Cloud Data Security Fall Short
Sep 6, 2024
In
Protegrity
Anatomy of a Centralized Exchanges Attack
Sep 6, 2024
In
Fireblocks
3 Essential Capabilities for Modern Cloud Data Protection
Sep 6, 2024
In
Protegrity
The file table: osquery's secret weapon
Sep 6, 2024
In
1Password
The business guide to ISO 27001 compliance and certification
Sep 6, 2024
In
1Password
Secret Leaks: The Predominant Issue in Software Supply Chain Security
Sep 6, 2024
In
Kroll
5 Steps to Send An Encrypted Email in Gmail
Sep 6, 2024
In
Nightfall
Understanding the Schools and Libraries Cybersecurity Pilot Program
Sep 6, 2024
In
Arctic Wolf
Understanding FSMO Roles in Active Directory
Sep 6, 2024
In
Netwrix
Critical Vulnerabilities Patched in Veeam Products
Sep 6, 2024
In
Arctic Wolf
Evolution of Scalper Bots Part 3: Expansion into New Markets
Sep 6, 2024
In
Netacea
Arctic Wolf Observes Akira Ransomware Campaign Targeting SonicWall SSLVPN Accounts
Sep 6, 2024
In
Arctic Wolf
Datadog delivers smarter vulnerability remediation
Sep 6, 2024
In
Datadog
Phishing Attack Takes a Two-Step Approach to Leverage Legitimate Sites and Evade Detection
Sep 6, 2024
In
KnowBe4
Your Return on Investment: Veracode Dynamic Analysis
Sep 6, 2024
In
Veracode
More Blogs
Upcoming Events
Latest Customer Stories
A Recent Interview Uncovers How Berlitz Corporation Reduced Critical Alerts by 86% and Saved 100K with CyCognito
Jul 22, 2024
In
CyCognito
CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity
Jul 2, 2024
In
CrowdStrike
Recent Interview Reveals How Asklepios Kliniken GmbH Improves Risk Exposure with CyCognito
Jul 1, 2024
In
CyCognito
Arizona Department of Homeland Security enhances cybersecurity with Elastic's AI-driven security analytics
Jul 1, 2024
In
Elastic
Phoenix keeps over 20,000 endpoints safe and secure with Tanium
Jun 18, 2024
In
Tanium
A TrustCloud Trustimonial: DataRobot
Jun 18, 2024
In
TrustCloud
Building a next-gen SOC at Pinewood, a leading MSSP, underpinned by Elastic SIEM
Jun 6, 2024
In
Elastic
How GitGuardian Provides Peace of Mind for Kubefirst
Jun 6, 2024
In
GitGuardian
What Udemy is building with AI in Tines
Jun 5, 2024
In
Tines
Blackpoint Cyber & ChaosSearch | Customer Story
Jun 5, 2024
In
ChaosSearch
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.