Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Non-repudiation: Your Virtual Shield in Cybersecurity
Human risk management automation can help beat burnout
Hacked Creativity? How Cyber Security Threats Impact Artists
AI-driven cyber attacks to be the norm within a year, say security leaders
Code Intelligence Releases New Feature Allowing Developers to Monitor Code Testing KPIs in Real-Time and Write 30% Fewer Unit Tests
Combating phishing attacks with passwordless FIDO2 authentication
How API Security Factors into DORA Compliance
Safeguarding Your LLM-Powered Applications: A Comprehensive Approach
Streamlining Incident Response: How CrowdStrike Falcon EDR integration enhances threat detection
Data Breach Response and Investigation: 8 Steps for Efficient Remediation
How Exposure Visibility Turbo Charges Strategic Security Prioritization
Announcing our $50M Series B extension
"All for One and One for All": The EU Cyber Solidarity Act Strengthens Digital Defenses
UK IT Leaders Are Prioritizing Cybersecurity: But Is This a Good Thing?
The Essential Guide to Why PEP Screening Matters
How to write 30% fewer tests with fuzzing
Going Backstage with OPA
CTI Roundup: A Malicious Notepad++ Plugin, "Junk Gun" Ransomware, and a Google Malvertising Campaign
Vulnerability Assessments vs. Penetration Testing: Key Differences
Secure-by-Design Software in DevSecOps
Breaking
Featured Posts
Human risk management automation can help beat burnout
Apr 24, 2024
In
CultureAI
Hacked Creativity? How Cyber Security Threats Impact Artists
Apr 24, 2024
In
SecuritySenses
How MSPs Can Shine As SMEs Demand More Support
Apr 17, 2024
In
JumpCloud
Cloud computing - The first step to an effective data modernisation strategy
Apr 5, 2024
In
Protegrity
The Impact of Evolving Regulation and Compliance on API Security
Mar 22, 2024
In
Noname Security
Network Security Gets Sassy: The Benefits of Unified SASE for the Modern Business
Mar 21, 2024
In
Xalient
Harnessing the value of data with data monetisation
Mar 20, 2024
In
Protegrity
Utilities and Energy a Prime Target For API Security Incidents
Mar 15, 2024
In
Noname Security
More Posts
Latest News
Code Intelligence Releases New Feature Allowing Developers to Monitor Code Testing KPIs in Real-Time and Write 30% Fewer Unit Tests
Apr 24, 2024
In
Code Intelligence
AI-driven cyber attacks to be the norm within a year, say security leaders
Apr 24, 2024
In
Netacea
Announcing our $50M Series B extension
Apr 24, 2024
In
Tines
Xalient Unveils MARTINA Predict 2.0: Revolutionizing AIOps with Advanced Anomaly Detection and Predictive Insights
Apr 23, 2024
In
Xalient
Snyk Code's autofixing feature, DeepCode AI Fix, just got better
Apr 23, 2024
In
Snyk
Outpost24 Enhances Attack Surface Management with Manual Rescanning
Apr 22, 2024
In
Outpost 24
Wallarm's Open Source API Firewall debuts at Blackhat Asia 2024 - Introduces Key New Features & Functionalities
Apr 22, 2024
In
Wallarm
Introducing UpGuard Trust Exchange
Apr 19, 2024
In
UpGuard
Cloudflare named in 2024 Gartner Magic Quadrant for Security Service Edge
Apr 18, 2024
In
Cloudflare
Global CISO Dawn-Marie Hutchinson joins Xalient as Non-Executive Director
Apr 17, 2024
In
Xalient
Forward Networks Achieves SOC 2 Type II Compliance, Reiterating Commitment to Data Security and Transparency
Apr 17, 2024
In
Forward Networks
From Risk to Fix in a Single Click: How CultureAI Are Redefining Nudges in Cyber Security
Apr 16, 2024
In
CultureAI
KnowBe4 Named a Leader in the Spring 2024 G2 Grid Report for Security Awareness Training
Apr 16, 2024
In
KnowBe4
Pentest People Gain NCSC Cyber Advisor Status
Apr 15, 2024
In
Pentest People
More News
Latest Blogs
Non-repudiation: Your Virtual Shield in Cybersecurity
Jan 18, 2038
In
Tripwire
Combating phishing attacks with passwordless FIDO2 authentication
Apr 24, 2024
In
ManageEngine
"All for One and One for All": The EU Cyber Solidarity Act Strengthens Digital Defenses
Apr 24, 2024
In
Tripwire
Secure-by-Design Software in DevSecOps
Apr 24, 2024
In
GitGuardian
UK IT Leaders Are Prioritizing Cybersecurity: But Is This a Good Thing?
Apr 24, 2024
In
Tripwire
360 degrees of application security with Snyk
Apr 24, 2024
In
Snyk
Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime.
Apr 24, 2024
In
AT&T Cybersecurity
Data Breach Response and Investigation: 8 Steps for Efficient Remediation
Apr 24, 2024
In
Ekran
The Essential Guide to Why PEP Screening Matters
Apr 24, 2024
In
IDcentral
How API Security Factors into DORA Compliance
Apr 24, 2024
In
Noname Security
How to write 30% fewer tests with fuzzing
Apr 24, 2024
In
Code Intelligence
Safeguarding Your LLM-Powered Applications: A Comprehensive Approach
Apr 24, 2024
In
Protecto
Going Backstage with OPA
Apr 24, 2024
In
Styra
Streamlining Incident Response: How CrowdStrike Falcon EDR integration enhances threat detection
Apr 24, 2024
In
Corelight
CTI Roundup: A Malicious Notepad++ Plugin, "Junk Gun" Ransomware, and a Google Malvertising Campaign
Apr 24, 2024
In
Tanium
How Exposure Visibility Turbo Charges Strategic Security Prioritization
Apr 24, 2024
In
BitSight
Vulnerability Assessments vs. Penetration Testing: Key Differences
Apr 24, 2024
In
Jit
Mindful cybersecurity: 5 cybersecurity strategies for stress-free living
Apr 23, 2024
In
ManageEngine
Fueling Resilience: Strengthening Physical and Cyber Defenses in Oil Refineries
Apr 23, 2024
In
SecuritySenses
The Impact of UNECE R155 on Automotive Cybersecurity
Apr 23, 2024
In
AT&T Cybersecurity
More Blogs
Upcoming Events
Latest Customer Stories
Securitize integrates Fireblocks to improve its security in the tokenization of real-world assets
Apr 9, 2024
In
Fireblocks
Why Visma chose Aikido Security for its 170+ companies
Mar 28, 2024
In
Aikido
Spoutible Enhances Platform Security through Partnership with Wallarm
Mar 26, 2024
In
Wallarm
How Effortless Solutions Managed Multi-Tiered Client Needs with BoxyHQ SSO
Mar 26, 2024
In
BoxyHQ
Zodia Markets Integrates Fireblocks to Transform Corporate Cross-Border Payments
Mar 14, 2024
In
Fireblocks
Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik
Mar 14, 2024
In
Rubrik
Achieving Seamless SSO Integration: Why BlockSurvey Selected BoxyHQ
Mar 8, 2024
In
BoxyHQ
Leveraging BoxyHQ's Open-Source SSO for Greater Market Reach and Compliance: MonkeyFit
Feb 28, 2024
In
BoxyHQ
How REI built a DevSecOps culture and how Snyk helped
Feb 27, 2024
In
Snyk
Sumo Logic & Gigamon -- Three Top Security Use Cases
Feb 27, 2024
In
Sumo Logic
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.