Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Source for News & Information on Security Applications & Tools
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Logicalis Acquires Q Associates to extend specialist Microsoft and data-centric IT services capabilities across their UK&I operation
Fortune and Great Place to Work® Name Forward Networks One of the 2022 Best Small Workplaces, Ranking #20 Nationally
Driving quantified success with Elastic Security
Secure SDLC 101
No Service Is Safe - Atlassian Demands Increasing
How to Rebrand 'Bossware' at Your Company
Report: Vintage Vulnerabilities Never Go Out of Fashion
AWS re:Inforce 2022 recap
5 Misconceptions About Penetration Testing for Mobile Apps
Identity Theft: 5 Different Types & How to Protect Yourself
Top 3 Largest Threats for Cloud Shadow Data
Improving CrowdStrike Falcon Detection Content with the Gap Analysis Team
Why is Executive Reporting in Cybersecurity Important in 2022?
How to Reduce Your Cybersecurity Insurance Premium in 2022
Building a BYOD checklist for your business
Stories from the SOC - Credential compromise and the importance of MFA
Don't Hack the Computer - Hack the Person! Recently Observed Social Engineering Attacks
Cybersecurity in iGaming: How to Protect Your Business from Cybercrime
Keeper vs Bitwarden: A Side-by-Side Comparison
CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products
Breaking
Featured Posts
Sponsored By TORQ
An Introduction to Automation Basics
Aug 5, 2022
In
Torq
Three Hard Truths About Organizational Cybersecurity
Jul 20, 2022
In
Keeper
Sponsored By PENTEST PEOPLE
The Beginning of Ransomware
Jul 18, 2022
In
Pentest People
Sponsored By CYBRIANT
How Your Business Can Benefit from Cyber Threat Intelligence
Jul 14, 2022
In
Cybriant
Sponsored By TORQ
Automated Security Alert Remediation: A Closer Look
Jul 9, 2022
In
Torq
Sponsored By CLOUDFABRIX
How Modern Log Intelligence Meets New Cybersecurity Regulations by CERT-In
Jul 9, 2022
In
CloudFabrix
Security risks from the 'hybrid holiday'
Jul 5, 2022
In
ManageEngine
How to decide what to fix when you can't fix everything
Jun 17, 2022
In
Snyk
More Posts
Latest News
Logicalis Acquires Q Associates to extend specialist Microsoft and data-centric IT services capabilities across their UK&I operation
Aug 8, 2022
Fortune and Great Place to Work® Name Forward Networks One of the 2022 Best Small Workplaces, Ranking #20 Nationally
Aug 8, 2022
In
Forward Networks
CREST launches OWASP Verification Standard (OVS) Program
Aug 4, 2022
SimSpace Chooses The Nuvias Group as its First Distributor in the UK
Aug 4, 2022
Trustwave Named Innovation Leader in Frost & Sullivan's Frost Radar Global Managed Detection and Response Market
Aug 4, 2022
In
Trustwave
WatchGuard in CRN's 2022 Top 100 Executives List
Aug 4, 2022
In
WatchGuard
Endace and Vectra Partner to Equip IT Teams with Deep Forensic Insight to Combat Even the Toughest Cyberattacks
Aug 3, 2022
Rubrik Named a Leader in the 2022 Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions
Aug 3, 2022
In
Rubrik
Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses
Aug 3, 2022
In
Lookout
WatchGuard Achieves the Highest Recognition
Aug 3, 2022
In
WatchGuard
Axis Raises the Bar with Modern Day ZTNA Service that Boasts Hyper-Intelligence, Simplicity, and 350 Global Edges
Aug 2, 2022
In
Axis Security
Lookout contributes to 2022 Verizon MSI With Mobile and Cloud Security Insights
Aug 2, 2022
In
Lookout
CREST Defensible Penetration Test released
Aug 1, 2022
Netacea recognized as a Sample Vendor in Gartner Hype Cycle for Application Security 2022
Aug 1, 2022
In
Netacea
More News
Latest Blogs
Don't Hack the Computer - Hack the Person! Recently Observed Social Engineering Attacks
Aug 8, 2022
In
SecurityScorecard
Cybersecurity in iGaming: How to Protect Your Business from Cybercrime
Aug 8, 2022
In
INETCO
Keeper vs Bitwarden: A Side-by-Side Comparison
Aug 8, 2022
In
Keeper
CVE-2022-31656 - Critical Authentication Bypass Vulnerability in Multiple VMware Products
Aug 8, 2022
In
Arctic Wolf
Ransomware 2022: Facts and Statistics
Aug 8, 2022
In
Pentest People
The Importance of a Machine Learning-Based Source Code Classifier
Aug 8, 2022
In
Netskope
No Service Is Safe - Atlassian Demands Increasing
Aug 8, 2022
In
Cyberint
Driving quantified success with Elastic Security
Aug 8, 2022
In
Elastic
Report: Vintage Vulnerabilities Never Go Out of Fashion
Aug 8, 2022
In
Rezilion
Secure SDLC 101
Aug 8, 2022
In
Synopsys
5 Misconceptions About Penetration Testing for Mobile Apps
Aug 8, 2022
In
Appknox
How to Rebrand 'Bossware' at Your Company
Aug 8, 2022
In
Veriato
Top 3 Largest Threats for Cloud Shadow Data
Aug 8, 2022
In
Polar Security
AWS re:Inforce 2022 recap
Aug 8, 2022
In
Snyk
Identity Theft: 5 Different Types & How to Protect Yourself
Aug 8, 2022
In
UpGuard
Why is Executive Reporting in Cybersecurity Important in 2022?
Aug 8, 2022
In
UpGuard
Improving CrowdStrike Falcon Detection Content with the Gap Analysis Team
Aug 8, 2022
In
CrowdStrike
How to Reduce Your Cybersecurity Insurance Premium in 2022
Aug 8, 2022
In
UpGuard
Building a BYOD checklist for your business
Aug 8, 2022
In
Redscan
Stories from the SOC - Credential compromise and the importance of MFA
Aug 8, 2022
In
AT&T Cybersecurity
More Blogs
Upcoming Events
Latest Customer Stories
Improving developer experience with security tools at Pinterest
Jul 14, 2022
In
Snyk
A day In The life of a Fashion Products Company CISO - Vikas Yadav
Jun 29, 2022
In
Snyk
New Netskope Customer, United States Patent and Trademark Office (USPTO), Leads the Way in Security Modernization with First Ever US Federal Civilian SASE Contract
Jun 28, 2022
In
Netskope
Preqin Moves to Secure Cloud File Sharing with Egnyte
Jun 23, 2022
In
Egnyte
RedAbierta chooses INETCO BullzAI to secure its payment channels
Jun 22, 2022
In
INETCO
Royal Flying Doctor Service Queensland Protects The Crown Jewels of Patient & Aviation Data
Jun 16, 2022
In
Rubrik
NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats
Jun 10, 2022
In
Rubrik
Case Study: The Compatibility Challenge of Using Outside Software in Product Development
Jun 9, 2022
In
Rezilion
Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare
Jun 7, 2022
In
CurrentWare
CyRC Case Study: Securing BIND 9
May 24, 2022
In
Synopsys
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.