Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Source for News & Information on Security Applications & Tools
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Four Takeaways as the European Union's General Data Protection Regulation (GDPR) Turns 4
Rezilion Researchers Find 85% of Vulnerabilities Pose No Risk
What is ePHI? A Guide to electronic Protected Health Information (ePHI)
What is the difference between a vendor and a third party vendor?
Are your Apple devices safe from the latest vulnerabilities?
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun
How To Tell An Employee They Need to Improve-7+ Tips for Success
Suspicious behavior: OTX Indicator of Compromise - Detection & response
Is GDPR a priority for businesses in 2022?
Corelight Investigator accelerates threat hunting
WhiteSource is Now Mend: You Code, We Cure
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
5 Ways to Effectively Prevent Data Leakage
What capabilities are critical to the success of your AppSec program?
Pyrsia: Decentralized Package Network that Secures the Open Source Supply Chain
Pyrsia: Open Source Software that Helps Protect the Open Source Supply Chain
JFrog Connect: Ready for What's Next for DevSecOps, Edge and IoT
What we learned at KubeCon + CloudNativeCon Europe 2022: From presentations to accolades
Webinar: "I get paid to hack your company and these are the controls I hate most!"
5th anniversary of WannaCry: What we have learned
Breaking
Featured Posts
Four Takeaways as the European Union's General Data Protection Regulation (GDPR) Turns 4
May 26, 2022
In
CrowdStrike
How Tech Innovation is Revolutionising Cybersecurity for Law Firms
May 24, 2022
In
SecuritySenses
Port scanners and open ports: What you should know
May 23, 2022
In
ManageEngine
Sponsored By PENTEST PEOPLE
Ransomware Attacks: How They Happen, the Threats and Risks
May 16, 2022
In
Pentest People
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework
May 10, 2022
In
CrowdStrike
Sponsored By CLOUDFABRIX
The Future of AIOps
May 10, 2022
In
CloudFabrix
World Password Day - The password's time has passed
May 5, 2022
In
SecuritySenses
Sponsored By TORQ
What Is CSPM? A Closer Look at Cloud Security Posture Management
May 2, 2022
In
Torq
More Posts
Latest News
Corelight Investigator accelerates threat hunting
May 25, 2022
In
Corelight
WhiteSource is Now Mend: You Code, We Cure
May 25, 2022
In
WhiteSource
Pyrsia: Decentralized Package Network that Secures the Open Source Supply Chain
May 25, 2022
In
JFrog
Digicel Deploys Enea AdaptiveMobile Security to Protect Mobile Networks in 26 Caribbean and Central American Markets
May 24, 2022
INETCO adds additional financial services and digital currencies expertise to Advisory Board
May 19, 2022
In
INETCO
Latest Features Enhance Workflow Creation, Add Modern Controls
May 18, 2022
In
Torq
Forward Networks Recognized For Excellence In Customer Service
May 18, 2022
In
Forward Networks
Rezilion Adds Dynamic Software Bill of Materials to its Platform, Providing Organizations With Continuous View of All Software Components and Exploitable Risk
May 17, 2022
In
Rezilion
Westcon-Comstor launches own flexible payment solutions to drive partner success
May 17, 2022
ThreatQuotient Selected By Comcast To Support Cybersecurity Operations
May 17, 2022
In
ThreatQuotient
Snyk Appoints Adi Sharabani as new Chief Technology Officer
May 17, 2022
In
Snyk
Become Unstoppable with the Rubrik Data Security Command Center
May 17, 2022
In
Rubrik
Stronger Cybersecurity, Thanks to the New Rubrik Security Cloud
May 17, 2022
In
Rubrik
Arctic Wolf Leads Cybersecurity Rankings in 2022 CNBC Disruptor 50 List
May 17, 2022
In
Arctic Wolf
More News
Latest Blogs
Rezilion Researchers Find 85% of Vulnerabilities Pose No Risk
May 26, 2022
In
Rezilion
What is ePHI? A Guide to electronic Protected Health Information (ePHI)
May 26, 2022
In
Nightfall
What is the difference between a vendor and a third party vendor?
May 26, 2022
In
Cyphere
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun
May 25, 2022
In
CrowdStrike
Are your Apple devices safe from the latest vulnerabilities?
May 25, 2022
In
ManageEngine
4 Database Access-Control Methods to Automate
May 25, 2022
In
Torq
How To Tell An Employee They Need to Improve-7+ Tips for Success
May 25, 2022
In
CurrentWare
Suspicious behavior: OTX Indicator of Compromise - Detection & response
May 25, 2022
In
AT&T Cybersecurity
Is GDPR a priority for businesses in 2022?
May 25, 2022
In
WatchGuard
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
May 25, 2022
In
SecurityScorecard
5 Ways to Effectively Prevent Data Leakage
May 25, 2022
In
SecurityScorecard
What capabilities are critical to the success of your AppSec program?
May 25, 2022
In
Synopsys
Pyrsia: Open Source Software that Helps Protect the Open Source Supply Chain
May 25, 2022
In
JFrog
JFrog Connect: Ready for What's Next for DevSecOps, Edge and IoT
May 25, 2022
In
JFrog
What we learned at KubeCon + CloudNativeCon Europe 2022: From presentations to accolades
May 25, 2022
In
CloudCasa
Webinar: "I get paid to hack your company and these are the controls I hate most!"
May 25, 2022
In
Redscan
5th anniversary of WannaCry: What we have learned
May 25, 2022
In
Rezilion
New Kroll threat landscape report reveals threat actors targeting email for access and extortion
May 24, 2022
In
Redscan
npm package hijacking through domain takeover - how bad is this "new" attack?
May 24, 2022
In
JFrog
How DNS filtering can help protect your business from Cybersecurity threats
May 24, 2022
In
AT&T Cybersecurity
More Blogs
Upcoming Events
Latest Customer Stories
CyRC Case Study: Securing BIND 9
May 24, 2022
In
Synopsys
How LiveRamp used Snyk to remediate Log4Shell
May 19, 2022
In
Snyk
Lookout Helps a Leading Financial Technology Company Improve Security and Compliance
May 10, 2022
In
Lookout
SurveyMonkey talks with Snyk about developer security during hypergrowth
May 5, 2022
In
Snyk
New York Department of Financial Services Modernizes Regulatory Oversight through Establishing First-of-its-Kind Use Case with SecurityScorecard
May 4, 2022
In
SecurityScorecard
Beekeeper Serves Up Secure Communications, Data, and Applications Across Cloud Environments with Sysdig
May 3, 2022
In
Sysdig
Customer Spotlight - Civo
Apr 14, 2022
In
Bulletproof
How Y42 quickly onboards new team members with 1Password
Apr 12, 2022
In
1Password
The New York Racing Association ensures a secure IT environment using AD360
Apr 5, 2022
In
ManageEngine
Partners Health Management Drives Better Outcomes for Members and Communities
Mar 30, 2022
In
ForgeRock
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.