Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Source for News & Information on Security Applications & Tools
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Building a secure CI/CD pipeline with GitHub Actions
Microsoft Discovers Security Flaws In Pre-installed Android Apps
What is the NIST Framework? An Introduction and a Look at Its Five Core Functions
What is the Difference Between Cyber Resilience and Cybersecurity?
How Risk Intelligence Impacts Cyber Readiness
Improving Clinical Operations Efficiency through Network Analytics
Best Data Security Podcasts for 2022
Democratizing Data Using a DataFabric & How it Benefits IT Enterprises
Stories from the SOC - Detecting internal reconnaissance
Secure Software Development - SDLC Best Practices
9 Best Data Leak Detection Software Solutions
What is Cache Poisoning?
Emotet: Still Abusing Microsoft Office Macros
Celebrating one year of Rapid Scan Static
10 Data-Centric Use Cases for better and more advanced CAD data protection
How to Prevent Out-of-Bounds Document Sharing with Egnyte
How to Protect Your Remote Workforce from a Cyberattack
What have we learned from scanning over 10,000 Kubernetes clusters with Kubescape?
What is Attack Surface Management Software?
19 Most Common Types of Phishing Attacks in 2022
Breaking
Featured Posts
How to decide what to fix when you can't fix everything
Jun 17, 2022
In
Snyk
Sponsored By CYBRIANT
10 Ways to Reduce Your Organization's Network Security Risk
Jun 15, 2022
In
Cybriant
Sponsored By PENTEST PEOPLE
Penetration Testing Methodologies
Jun 15, 2022
In
Pentest People
Sponsored By TORQ
4 Database Access-Control Methods to Automate
Jun 6, 2022
In
Torq
Sponsored By CLOUDFABRIX
AIOps + DataFabric = A game-changer for IT?
May 30, 2022
In
CloudFabrix
Four Takeaways as the European Union's General Data Protection Regulation (GDPR) Turns 4
May 26, 2022
In
CrowdStrike
How Tech Innovation is Revolutionising Cybersecurity for Law Firms
May 24, 2022
In
SecuritySenses
Port scanners and open ports: What you should know
May 23, 2022
In
ManageEngine
More Posts
Latest News
We're positioned as a Leader in three of the 2022 IDC MarketScape Assessments for UEM. We're thrilled!
Jun 24, 2022
In
ManageEngine
M&A, trust in software, and a good night's sleep
Jun 23, 2022
In
Synopsys
Building Security into Your M&A Process Part 1: Due Diligence
Jun 23, 2022
In
Netskope
Netacea Announces Partnership Agreement With AVANT
Jun 22, 2022
In
Netacea
Lookout Powers VMware Workspace ONE Mobile Threat Defense (MTD)
Jun 22, 2022
In
Lookout
Introducing 1Password for Visual Studio Code
Jun 22, 2022
In
1Password
WhiteHat brings new dimension to DAST capabilities at Synopsys
Jun 22, 2022
In
Synopsys
Axis Security Announces Atmos 2022 Summer Release Highlighting Innovation in Digital Experience Monitoring, Internet Security and Automated Operations
Jun 21, 2022
In
Axis Security
New Research from Snyk and The Linux Foundation Reveals Significant Security Concerns Resulting from Open Source Software Ubiquity
Jun 21, 2022
In
Snyk
Alcatel-Lucent Enterprise Appoints the Nuvias Group as Distributor across the Nordics and Baltics
Jun 21, 2022
Announcing Insights from 1Password
Jun 21, 2022
In
1Password
Enforcing Cloud Resource Policy Guardrails for HashiCorp Terraform Cloud
Jun 15, 2022
In
Styra
With Trustwave, the Best in MDR Just Got Better
Jun 14, 2022
In
Trustwave
New functionality added to the Detectify API
Jun 9, 2022
In
Detectify
More News
Latest Blogs
Secure Software Development - SDLC Best Practices
Jun 27, 2022
In
Cyphere
9 Best Data Leak Detection Software Solutions
Jun 27, 2022
In
UpGuard
What is Cache Poisoning?
Jun 27, 2022
In
UpGuard
Emotet: Still Abusing Microsoft Office Macros
Jun 27, 2022
In
Netskope
Celebrating one year of Rapid Scan Static
Jun 27, 2022
In
Synopsys
Microsoft Discovers Security Flaws In Pre-installed Android Apps
Jun 27, 2022
In
Appknox
10 Data-Centric Use Cases for better and more advanced CAD data protection
Jun 27, 2022
In
SECUDE
What is the NIST Framework? An Introduction and a Look at Its Five Core Functions
Jun 27, 2022
In
SecurityScorecard
How to Prevent Out-of-Bounds Document Sharing with Egnyte
Jun 27, 2022
In
Egnyte
What is the Difference Between Cyber Resilience and Cybersecurity?
Jun 27, 2022
In
SecurityScorecard
Building a secure CI/CD pipeline with GitHub Actions
Jun 27, 2022
In
Snyk
How Risk Intelligence Impacts Cyber Readiness
Jun 27, 2022
In
SecurityScorecard
Improving Clinical Operations Efficiency through Network Analytics
Jun 27, 2022
In
Forescout
Best Data Security Podcasts for 2022
Jun 27, 2022
In
Polar Security
Democratizing Data Using a DataFabric & How it Benefits IT Enterprises
Jun 27, 2022
In
CloudFabrix
Stories from the SOC - Detecting internal reconnaissance
Jun 27, 2022
In
AT&T Cybersecurity
What have we learned from scanning over 10,000 Kubernetes clusters with Kubescape?
Jun 26, 2022
In
ARMO
What is Attack Surface Management Software?
Jun 26, 2022
In
UpGuard
19 Most Common Types of Phishing Attacks in 2022
Jun 26, 2022
In
UpGuard
How to Protect Your Remote Workforce from a Cyberattack
Jun 26, 2022
In
Tripwire
More Blogs
Upcoming Events
Latest Customer Stories
Preqin Moves to Secure Cloud File Sharing with Egnyte
Jun 23, 2022
In
Egnyte
RedAbierta chooses INETCO BullzAI to secure its payment channels
Jun 22, 2022
In
INETCO
Royal Flying Doctor Service Queensland Protects The Crown Jewels of Patient & Aviation Data
Jun 16, 2022
In
Rubrik
NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats
Jun 10, 2022
In
Rubrik
Case Study: The Compatibility Challenge of Using Outside Software in Product Development
Jun 9, 2022
In
Rezilion
Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare
Jun 7, 2022
In
CurrentWare
CyRC Case Study: Securing BIND 9
May 24, 2022
In
Synopsys
How LiveRamp used Snyk to remediate Log4Shell
May 19, 2022
In
Snyk
Lookout Helps a Leading Financial Technology Company Improve Security and Compliance
May 10, 2022
In
Lookout
SurveyMonkey talks with Snyk about developer security during hypergrowth
May 5, 2022
In
Snyk
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.