Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
Bluesky
GitHub
Winter 2024 Product Release Notes: What's New at Astra Security
Is An Email Continuity Service Mandated?
Introducing the RUM analytics dashboard in Applications Manager
Introduction to PowerShell Invoke-Command
Six ways privilege management improves your security posture
Essential PowerShell Commands: A Cheat Sheet for Beginners
Securing the Backbone of Enterprise GenAI
What is AWS EC2? Everything about EC2 Fundamentals in AWS
Decoding Hugging Face Model Metrics: A Guide to Understanding and Interpreting Parameters
What are the ISO 27001:2022 controls?
A Step-by-Step Guide to the Remote Code Execution Vulnerability
Emerging Threat: Fortinet CVE-2024-55591
Masterminds Behind Blender.io And Sinbad.io Crypto Mixers Charged
First Ever Magic Quadrant for Email Security Platforms by Gartner
Code Intelligence Wins Prestigious German AI Award at de:hub Pitch Night 2025
Everything You Need to Know About Grok AI and Your Privacy
Cyber Threats in London: The Facts and Figures
How Open-Source Security Frameworks Drive Better Cyber Defense
How a Large Healthcare Company Slashed Their Secrets Incidents by Half
Preparing for 2025: Key Cybersecurity Trends IT Leaders Need to Know
Breaking
Featured Posts
Dumb ways to risk a data breach
Jan 15, 2025
In
Snyk
2025 Predictions - Navigating Through the Challenges and Opportunities Ahead
Jan 9, 2025
In
Protegrity
Sponsored By EVENTSENTRY
Capturing Network Traffic anytime
Jan 1, 2025
In
EventSentry
Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility
Dec 18, 2024
In
ThreatQuotient
The Key Steps to Ensuring DORA Compliance
Dec 13, 2024
In
Protegrity
2025 - A Year of Perpetual Change
Dec 6, 2024
In
JumpCloud
The Role of Data Security in Protecting Sensitive Information Across the Finance Industry
Nov 30, 2024
In
Protegrity
The Role of Data Recovery in Cyber Resilience
Nov 19, 2024
In
11:11 Systems
More Posts
Latest News
Code Intelligence Wins Prestigious German AI Award at de:hub Pitch Night 2025
Jan 16, 2025
In
Code Intelligence
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Jan 15, 2025
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
Jan 15, 2025
Aembit Announces Speaker Lineup for the Inaugural NHIcon
Jan 15, 2025
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase
Jan 14, 2025
In
Snyk
Teleport 17
Jan 14, 2025
In
Teleport
Code Intelligence Launches Spark, Its AI Test Agent That Autonomously Uncovers Vulnerabilities Without Human Interaction
Jan 9, 2025
In
Code Intelligence
WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
Acronis Appoints Gerald Beuchelt as Chief Information Security Officer
Jan 8, 2025
In
Acronis
WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
Jan 7, 2025
Security Risk Advisors joins the Microsoft Intelligent Security Association
Jan 7, 2025
1Password acquires Trelica, a trailblazer in SaaS access management
Jan 7, 2025
In
1Password
Egnyte Wins Big With Nine Comparably Awards in 2024
Jan 7, 2025
In
Egnyte
More News
Latest Blogs
Is An Email Continuity Service Mandated?
Jan 17, 2025
In
Spambrella
Winter 2024 Product Release Notes: What's New at Astra Security
Jan 17, 2025
In
Astra
Introducing the RUM analytics dashboard in Applications Manager
Jan 16, 2025
In
ManageEngine
Securing the Backbone of Enterprise GenAI
Jan 16, 2025
In
CyberArk
What is AWS EC2? Everything about EC2 Fundamentals in AWS
Jan 16, 2025
In
SignMyCode
Emerging Threat: Fortinet CVE-2024-55591
Jan 16, 2025
In
CyCognito
Decoding Hugging Face Model Metrics: A Guide to Understanding and Interpreting Parameters
Jan 16, 2025
In
Riscosity
First Ever Magic Quadrant for Email Security Platforms by Gartner
Jan 16, 2025
In
KnowBe4
A Step-by-Step Guide to the Remote Code Execution Vulnerability
Jan 16, 2025
In
Spectral
Everything You Need to Know About Grok AI and Your Privacy
Jan 16, 2025
In
Internxt
Masterminds Behind Blender.io And Sinbad.io Crypto Mixers Charged
Jan 16, 2025
In
ImmuniWeb
How Open-Source Security Frameworks Drive Better Cyber Defense
Jan 16, 2025
In
Netacea
Cyber Threats in London: The Facts and Figures
Jan 16, 2025
In
The Cyber Helpline
Preparing for 2025: Key Cybersecurity Trends IT Leaders Need to Know
Jan 16, 2025
In
11:11 Systems
How a Large Healthcare Company Slashed Their Secrets Incidents by Half
Jan 16, 2025
In
GitGuardian
Insights from the Codefinger Ransomware Attack: A Wake-Up Call for IT Leaders
Jan 16, 2025
In
11:11 Systems
The Growing Risk of Insider Threats in Cyber Security
Jan 16, 2025
In
CultureAI
Security Bulletin: CVE-2024-55591 Fortinet - Authentication Bypass
Jan 16, 2025
In
Centripetal
FSOCIETY & FUNKSEC Collaborate On Future Attacks
Jan 16, 2025
In
Cyberint
Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals
Jan 16, 2025
In
CrowdStrike
More Blogs
Upcoming Events
Latest Customer Stories
Neo4j: Building a Secure Future with Sysdig CNAPP
Jan 14, 2025
In
Sysdig
Yahoo's AppSec Journey: Scaling Security with Mend.io
Jan 14, 2025
In
Mend
Managing identities in a growing organization: Lessons from SECURA Insurance
Jan 6, 2025
In
One Identity
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
How ARMO Reduced Secrets Exposure with GitGuardian
Nov 12, 2024
In
GitGuardian
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.