Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Graylog Redefines SIEM with More Efficient and Effective Threat Detection
Your complete SaaS security guide-with best practices for ensuring it
Top FAQs about CrowdStrike Falcon Next-Gen SIEM
Why Institutional Adoption of Digital Assets is Skyrocketing in Africa
Policy as code in Kubernetes: security with seccomp and network policies
Malware Article: Enhancing Incident Response and Threat Intelligence
DLP 101: How to Prevent Data Exfiltration in the Cloud
Brain Cipher Ransomware: A Growing Threat and How to Defend Your Business
Top 5 Logistics and Postal Scams of 2024
CloudCasa October Feature Updates
Mastering PowerShell's Move-Item Cmdlet for File Management
Are You in Sync with Your Security Vendor?
Decoding Agent Tesla: The Spyware Stealing Data Silently!
Is Apple's Passwords App Safe?
What a 3-Year Plan to Cut Software Risks by 75% Looks Like
A Step-by-Step Guide to DORA Finance Compliance: Practical Advice for Financial Institutions
Cybersecurity Compliance for IT: Key Regulatory Frameworks and Standards
Confronting Common Container Security Vulnerabilities
Key learnings from the 2024 State of Cloud Security study
Ensure DORA compliance and app resiliency with Datadog
Breaking
Featured Posts
The Role of Cyber Security in Building Supply Chain Resilience and Efficiency
Oct 16, 2024
In
BlueVoyant
Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?
Oct 3, 2024
In
JumpCloud
Data Resilience and Protection in the Ransomware Age
Sep 18, 2024
In
11:11 Systems
The path of least resistance to Privileged Access Management
Sep 14, 2024
In
Xalient
Companies Aren't 'Owning' Their Data
Sep 12, 2024
In
Protegrity
How Organisations Can Master Incident Reporting Obligations Under NIS2
Sep 5, 2024
In
BlueVoyant
A Lack of Resources and Talent Leaves UK SMEs Dangerously Exposed
Sep 4, 2024
In
JumpCloud
Why Shadow IT Prevails for UK SMEs
Aug 7, 2024
In
JumpCloud
More Posts
Latest News
Introducing Graylog 6.1: A Monster Release Just in Time for Halloween
Oct 20, 2024
In
Graylog
Pentest People Achieves CREST CSIR Accreditation for Incident Response Services
Oct 18, 2024
In
Pentest People
CyCognito Announces Enhancements to its Automated Security Testing Product
Oct 17, 2024
In
CyCognito
Teleport delivers "crown jewel observability" with access control monitoring for critical infrastructure resources
Oct 17, 2024
In
Teleport
Introducing: Extensive AppSec visibility with Snyk Analytics
Oct 17, 2024
In
Snyk
KnowBe4 Named a Leader in the Fall 2024 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) Software
Oct 16, 2024
In
KnowBe4
New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content
Oct 15, 2024
In
WatchGuard
Introducing Policy SBOM: A Software Bill of Materials for your Authorization Policies
Oct 15, 2024
In
Styra
KnowBe4 Named a Leader in the Fall 2024 G2 Grid Report for Security Awareness Training
Oct 15, 2024
In
KnowBe4
New Release: ionCube Encoder 14 with PHP 8.3 support
Oct 15, 2024
In
ionCube24
Nucleus Security Positioned as a Growth Leader in Frost Radar: Application Security Posture Management, 2024
Oct 11, 2024
In
Nucleus
GitProtect 1.8.5 release brings a big launch - Azure DevOps Backup and DR
Oct 11, 2024
In
GitProtect
Keeper Named a G2 Leader in Multiple Cybersecurity Categories, Fall 2024
Oct 10, 2024
In
Keeper
SnykLaunch October 2024 Introduces Enhanced AI-Driven Security to Bolster Enterprise AppSec and DevSecOps Efforts
Oct 8, 2024
In
Snyk
More News
Latest Blogs
Graylog Redefines SIEM with More Efficient and Effective Threat Detection
Oct 21, 2024
In
Graylog
Are You in Sync with Your Security Vendor?
Oct 21, 2024
In
Cato Networks
Mastering PowerShell's Move-Item Cmdlet for File Management
Oct 21, 2024
In
Netwrix
Is Apple's Passwords App Safe?
Oct 21, 2024
In
Keeper
Decoding Agent Tesla: The Spyware Stealing Data Silently!
Oct 21, 2024
In
Fidelis Security
A Step-by-Step Guide to DORA Finance Compliance: Practical Advice for Financial Institutions
Oct 21, 2024
In
Protegrity
Cybersecurity Compliance for IT: Key Regulatory Frameworks and Standards
Oct 21, 2024
In
Protegrity
What a 3-Year Plan to Cut Software Risks by 75% Looks Like
Oct 21, 2024
In
Veracode
Confronting Common Container Security Vulnerabilities
Oct 21, 2024
In
Kroll
Key learnings from the 2024 State of Cloud Security study
Oct 21, 2024
In
Datadog
Ensure DORA compliance and app resiliency with Datadog
Oct 21, 2024
In
Datadog
Cyber Attackers are Adopting a "Mobile First" Attack Strategy
Oct 21, 2024
In
KnowBe4
Preventing Breaches Using Indicators of Compromise
Oct 21, 2024
In
Tripwire
Cybersecurity at Ports Gets a Boost with New Bipartisan Bill
Oct 21, 2024
In
Tripwire
Your complete SaaS security guide-with best practices for ensuring it
Oct 21, 2024
In
Vanta
Reducing the Fog of War by Increasing Cybersecurity Readiness
Oct 21, 2024
In
Tanium
Protecting your 1Password account with multi factor authentication
Oct 21, 2024
In
1Password
GitHub Comments from Legitimate Repositories Exploited to Deliver Remcos RAT
Oct 21, 2024
In
Netskope
Why Institutional Adoption of Digital Assets is Skyrocketing in Africa
Oct 21, 2024
In
Fireblocks
Top FAQs about CrowdStrike Falcon Next-Gen SIEM
Oct 21, 2024
In
CrowdStrike
More Blogs
Upcoming Events
Latest Customer Stories
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
How Investronaut Secured Digital Transformation with CyberArk Identity Solutions | CyberArk
Sep 23, 2024
In
CyberArk
JP | Customer Corner: "How BigCommerce Achieved Real-Time Cloud Security"
Sep 13, 2024
In
Sysdig
A Recent Interview Uncovers How Berlitz Corporation Reduced Critical Alerts by 86% and Saved 100K with CyCognito
Jul 22, 2024
In
CyCognito
CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity
Jul 2, 2024
In
CrowdStrike
Recent Interview Reveals How Asklepios Kliniken GmbH Improves Risk Exposure with CyCognito
Jul 1, 2024
In
CyCognito
Arizona Department of Homeland Security enhances cybersecurity with Elastic's AI-driven security analytics
Jul 1, 2024
In
Elastic
Phoenix keeps over 20,000 endpoints safe and secure with Tanium
Jun 18, 2024
In
Tanium
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.