Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
GitHub
Seemplicity Selected for Microsoft for Startups Pegasus Program
Vanta Delivers: New Products to Move Compliance Beyond the Standard
Bigger and badder: how DDoS attack sizes have evolved over the last decade
Enhancing AKS Backup with CloudCasa and Azure Arc
How attackers take advantage of Microsoft 365 services
Ransomware Gangs Evolve: They're Now Recruiting Penetration Testers
6 Ways to Prevent Man-in-the-Middle (MitM) Attacks
Out of 29 Billion Cybersecurity Events, Phishing was the Primary Method of Initial Attack
Exploitable! CVE-2024-0012 Authentication Bypass for PAN-OS
Beware of Fake Tech Support Scams
Using Bitsight Cybersecurity Data Feeds to Protect Critical Infrastructure
The Only Guide For NIST 800-53 You Need: Controls List, Control Examples, Challenges, Implementation Tips
Threat Actors are Sending Malicious QR Codes Via Snail Mail
SOC 2 Compliance Audit: Safeguarding Your Business's Data
Dark Side of Deals: Emerging Scams for Black Friday, Cyber Monday and Giving Tuesday
How To Remove Your Personal Information From the Internet
1Password's record-breaking growth in passkey adoption
What Happens if You Answer a Robocall?
Add Alias in Active Directory
Follow-Up: Arctic Wolf Observes Ongoing Exploitation of Critical Palo Alto Networks Vulnerability CVE-2024-0012 Chained with CVE-2024-9474
Breaking
Featured Posts
The Role of Data Recovery in Cyber Resilience
Nov 19, 2024
In
11:11 Systems
Building a Modern Identity Capability to Tackle DORA
Nov 13, 2024
In
JumpCloud
What Security Teams Need to Know About the EU's NIS 2 Directive
Oct 24, 2024
In
CyCognito
The Role of Cyber Security in Building Supply Chain Resilience and Efficiency
Oct 16, 2024
In
BlueVoyant
Is the Speed of AI Development Leaving UK SMEs Struggling to Plug Security Gaps?
Oct 3, 2024
In
JumpCloud
Data Resilience and Protection in the Ransomware Age
Sep 18, 2024
In
11:11 Systems
The path of least resistance to Privileged Access Management
Sep 14, 2024
In
Xalient
Companies Aren't 'Owning' Their Data
Sep 12, 2024
In
Protegrity
More Posts
Latest News
Seemplicity Selected for Microsoft for Startups Pegasus Program
Nov 20, 2024
In
Seemplicity
Vanta Delivers: New Products to Move Compliance Beyond the Standard
Nov 20, 2024
In
Vanta
Tanium Extends Endpoint Management Platform to Enhance Visibility, Control, and Remediation for Containerised Workloads
Nov 19, 2024
In
Tanium
Tanium Pioneers New Market Category, Delivers on Promise of Autonomous Endpoint Management
Nov 19, 2024
In
Tanium
Gen Q3 Threat Report: Millions Fooled by "Scam-Yourself Attacks"
Nov 19, 2024
In
Avast
ThreatQuotient Publishes 2024 Evolution of Cybersecurity Automation Adoption Research Report
Nov 19, 2024
In
ThreatQuotient
Nucleus Security Expands Channel Program to Meet Growing Demand
Nov 19, 2024
In
Nucleus
A New Era In Human Risk Management:Introducing KnowBe4 HRM+
Nov 19, 2024
In
KnowBe4
Trustwave Recognized in Two Asia Pacific IDC MarketScapes for Security Services
Nov 18, 2024
In
Trustwave
Xalient and SailPoint Navigate Towards Worry-Free Identity Security
Nov 14, 2024
In
Xalient
JumpCloud Announces Its First Free Virtual Conference for IT Professionals
Nov 13, 2024
In
JumpCloud
Persona Announces Integration with Okta's Workforce Identity Cloud to Enhance Workforce Identity Security
Nov 13, 2024
In
Persona
Introducing Veracode Risk Manager: A New Chapter in ASPM Built for Scale
Nov 13, 2024
In
Veracode
Mend.io is a Strong Performer in the Forrester Wave Software Composition Analysis, Q4 2024
Nov 13, 2024
In
Mend
More News
Latest Blogs
Enhancing AKS Backup with CloudCasa and Azure Arc
Nov 20, 2024
In
CloudCasa
Threat Actors are Sending Malicious QR Codes Via Snail Mail
Nov 20, 2024
In
KnowBe4
Dark Side of Deals: Emerging Scams for Black Friday, Cyber Monday and Giving Tuesday
Nov 20, 2024
In
KnowBe4
Emerging Threat: Palo Alto PAN-OS CVE-2024-0012 & CVE-2024-9474
Nov 20, 2024
In
CyCognito
1Password's record-breaking growth in passkey adoption
Nov 20, 2024
In
1Password
Vanta unveils new product innovations to move compliance beyond the standard
Nov 20, 2024
In
Vanta
Add Alias in Active Directory
Nov 20, 2024
In
Netwrix
Python NodeStealer Targets Facebook Ads Manager with New Techniques
Nov 20, 2024
In
Netskope
Databunker, Skyflow, and Piiano: A Comprehensive Privacy Vault Comparison
Nov 20, 2024
In
Komodo Consulting
Jit Achieves AWS Security Competency: A Milestone in Developer-First Security Innovation
Nov 20, 2024
In
Jit
Ransomware Gangs Evolve: They're Now Recruiting Penetration Testers
Nov 20, 2024
In
KnowBe4
"One customer migrated 45 workflows in 60 days": A Q&A with Tines engineer Whitney Young
Nov 20, 2024
In
Tines
How Sysdig streamlines cloud security posture management: Proactive risk management and tailored insights and controls
Nov 20, 2024
In
Sysdig
Out of 29 Billion Cybersecurity Events, Phishing was the Primary Method of Initial Attack
Nov 20, 2024
In
KnowBe4
The Hidden Costs of a SIEM: The Need for a New Approach
Nov 20, 2024
In
Centripetal
What Does Platformization Mean for MSSPs and MDRs?
Nov 20, 2024
In
LimaCharlie
Beware of Fake Tech Support Scams
Nov 20, 2024
In
KnowBe4
Bigger and badder: how DDoS attack sizes have evolved over the last decade
Nov 20, 2024
In
Cloudflare
Data Leakage Protection Solutions on the Rise Amid Increasing Cyber Threats
Nov 20, 2024
In
SafeAeon
The Only Guide For NIST 800-53 You Need: Controls List, Control Examples, Challenges, Implementation Tips
Nov 20, 2024
In
Cyphere
More Blogs
Upcoming Events
Latest Customer Stories
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
How Investronaut Secured Digital Transformation with CyberArk Identity Solutions | CyberArk
Sep 23, 2024
In
CyberArk
JP | Customer Corner: "How BigCommerce Achieved Real-Time Cloud Security"
Sep 13, 2024
In
Sysdig
A Recent Interview Uncovers How Berlitz Corporation Reduced Critical Alerts by 86% and Saved 100K with CyCognito
Jul 22, 2024
In
CyCognito
CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity
Jul 2, 2024
In
CrowdStrike
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.