Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Doppler announces integration with Datadog to streamline security and monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security platform. This collaboration provides engineering and operations teams with an integrated solution for securely managing sensitive credentials and gaining insights into cloud environments through real-time monitoring.

ThreatQuotient and Ask Sage Partner to Assist Governments in Achieving Cybersecurity Efficiencies

The partnership enables customers to securely train a number of supported AI models using curated Threat Intelligence, generate reports, and quickly and easily build threat insights based on an organization's specific requirements.

OWASP Top 10 LLM Applications 2025 - Critical Vulnerabilities & Risk Mitigation

The release of the OWASP Top 10 for LLM Applications 2025 provides a comprehensive overview of the evolving security challenges in the world of Large Language Models (LLMs). With advancements in AI, the adoption of LLMs like GPT-4, LaMDA, and PaLM has grown, but so have the risks. The new 2025 list builds upon the foundational threats outlined in previous years, reflecting the changing landscape of LLM security.

How Trustwave's Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview

Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard.

What is ACME Protocol and How does it Work: A Complete Guide

You might have visited a website and seen a warning that says: “Your connection is not private.” This often happens when a website’s security certificate has expired. It is a small oversight that can harm a website’s reputation and make visitors think twice before proceeding. For website owners, managing digital certificates manually can be a real challenge. To simplify this process, the ACME Protocol was developed.

Assessing Your Readiness for SSE Implementation

Your workforce is remote or hybrid, logging in from their homes, coffee shops, or random public networks, using cloud-based applications. Your data is increasingly being stored in the cloud, accessed from anywhere, traveling to who-knows-where. And your security is lagging behind. More than 90% of organizations have moved assets to the cloud, yet legacy security solutions are too complex and ultimately inadequate to secure the digital transformation.

The Future of Cyber Security Lies in Behavioural Analytics

Behavioural analytics in cyber security has emerged as a powerful tool for identifying and mitigating human risks. By focusing on how humans interact with systems, user behavioural analytics offer a proactive approach to threat detection, ensuring a more secure digital environment for businesses.

Top JFrog Security Research Discoveries of 2024

In our previous round-up of security research for 2023, we mentioned our surprise at the large volume of 29,000 vulnerabilities that were reported two years ago. But that didn’t prepare us for the astounding 40% increase, reported by Cyber Press, resulting in over 40,000 CVEs that were published over the past year in 2024.