Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
The HIPAA compliance checklist for security managers
The states of data, Intro: Why you should protect data at rest, in use, and in motion
AI in cybersecurity 101: The economics of bot vs bot battles
SAP Users: Prevent leaks during closed accounting periods with HaloCORE
Preparing for the UK Government's Cyber Essentials Certification
Meet Snyk for Government: Our developer security solution with FedRAMP ATO
Windows Vulnerability Exploited Using Braille 'Spaces' in Zero-Day Attacks
UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024
What CISOs Need to Know about ThreatQ's Support for the NIS2 Directive
What is Enterprise Attack Surface Management?
England and Wales Report a Spike in Computer Misuse
Physical Security In The Age Of Digital: Access Control System Vulnerabilities
What's Changed in CIS Critical Security Controls v8.1?
Top open-source CSPM projects to secure your cloud infrastructure
5 Ways to Prevent Subscription Abuse
Solving the cybersecurity skills shortage
The 4 Most Common Attack Vectors in LATAM
Five Hidden Costs of Cyber Attacks
Cost of Cybercrime Estimated 15.6 Trillion in 2029
Personal VPNs can be shady, but should companies ban them?
Breaking
Featured Posts
The path of least resistance to Privileged Access Management
Sep 14, 2024
In
Xalient
Companies Aren't 'Owning' Their Data
Sep 12, 2024
In
Protegrity
How Organisations Can Master Incident Reporting Obligations Under NIS2
Sep 5, 2024
In
BlueVoyant
A Lack of Resources and Talent Leaves UK SMEs Dangerously Exposed
Sep 4, 2024
In
JumpCloud
Why Shadow IT Prevails for UK SMEs
Aug 7, 2024
In
JumpCloud
Responsible Cloud Migration - Overcoming the Data Security Challenge
Aug 6, 2024
In
Protegrity
Sponsored By EVENTSENTRY
Can the EventSentry Agents cause the same outage & disruption like the CrowdStrike Falcon sensor did?
Jul 25, 2024
In
EventSentry
Why regulation is the cornerstone of AI development
Jul 2, 2024
In
Vanta
More Posts
Latest News
ManageEngine named as a Challenger again in the 2024 Gartner Magic Quadrant for Privileged Access Management
Sep 16, 2024
In
ManageEngine
CyberArk Recognized as a Leader in 2024 Gartner Magic Quadrant for PAM
Sep 11, 2024
In
CyberArk
Syteca, Formerly Ekran System, Unveils New Identity and Features at International Cyber Expo 2024
Sep 11, 2024
In
Ekran
Announcing new Snyk AppRisk integration with Orca Security
Sep 11, 2024
In
Snyk
Tanium Announces General Availability of Tanium Automate for Autonomous Actions Powered by Real-Time Data
Sep 10, 2024
In
Tanium
Silobreaker expands US reseller programme with ThreatQuotient
Sep 5, 2024
In
ThreatQuotient
Vanta Delivers: Introducing New Products for the Future of Governance, Risk and Compliance (GRC)
Sep 5, 2024
In
Vanta
Code Intelligence Appoints Dr. Eric Brüggemann as CEO as Company Continues to Grow at Scale
Sep 5, 2024
In
Code Intelligence
GRC Group Acquires Pentest People
Sep 5, 2024
In
Pentest People
Trustwave Named Frost & Sullivan Company of the Year
Sep 5, 2024
In
Trustwave
Keeper Named Value Leader by EMA for Privileged Access Management
Sep 4, 2024
In
Keeper
Introducing the Mend AppSec Platform
Sep 3, 2024
In
Mend
NEW: ARMO Platform Introduces Auto-Generation of Seccomp Profiles
Sep 3, 2024
In
ARMO
Nightfall AI selected as 2024 SC Awards Finalist
Aug 30, 2024
In
Nightfall
More News
Latest Blogs
The HIPAA compliance checklist for security managers
Sep 17, 2024
In
ManageEngine
The states of data, Intro: Why you should protect data at rest, in use, and in motion
Sep 17, 2024
In
ManageEngine
England and Wales Report a Spike in Computer Misuse
Sep 17, 2024
In
Tripwire
Insider Threats: The Danger Within
Sep 17, 2024
In
Devo
Top open-source CSPM projects to secure your cloud infrastructure
Sep 17, 2024
In
ARMO
What's Changed in CIS Critical Security Controls v8.1?
Sep 17, 2024
In
Tripwire
Data Security in AI Systems: Key Threats, Mitigation Techniques and Best Practices
Sep 17, 2024
In
Protecto
Solving the cybersecurity skills shortage
Sep 17, 2024
In
Octiga
5 Ways to Prevent Subscription Abuse
Sep 17, 2024
In
Memcyco
AI in cybersecurity 101: The economics of bot vs bot battles
Sep 17, 2024
In
One Identity
Five Hidden Costs of Cyber Attacks
Sep 17, 2024
In
Arctic Wolf
SAP Users: Prevent leaks during closed accounting periods with HaloCORE
Sep 17, 2024
In
SECUDE
Personal VPNs can be shady, but should companies ban them?
Sep 17, 2024
In
1Password
Preparing for the UK Government's Cyber Essentials Certification
Sep 17, 2024
In
Netskope
How much does a SOC 2 audit cost?
Sep 17, 2024
In
1Password
Meet Snyk for Government: Our developer security solution with FedRAMP ATO
Sep 17, 2024
In
Snyk
Windows Vulnerability Exploited Using Braille 'Spaces' in Zero-Day Attacks
Sep 17, 2024
In
Foresiet
UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024
Sep 17, 2024
In
UpGuard
The 4 Most Common Attack Vectors in LATAM
Sep 17, 2024
In
Cyberint
What is Enterprise Attack Surface Management?
Sep 17, 2024
In
UpGuard
More Blogs
Upcoming Events
Latest Customer Stories
JP | Customer Corner: "How BigCommerce Achieved Real-Time Cloud Security"
Sep 13, 2024
In
Sysdig
A Recent Interview Uncovers How Berlitz Corporation Reduced Critical Alerts by 86% and Saved 100K with CyCognito
Jul 22, 2024
In
CyCognito
CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity
Jul 2, 2024
In
CrowdStrike
Recent Interview Reveals How Asklepios Kliniken GmbH Improves Risk Exposure with CyCognito
Jul 1, 2024
In
CyCognito
Arizona Department of Homeland Security enhances cybersecurity with Elastic's AI-driven security analytics
Jul 1, 2024
In
Elastic
Phoenix keeps over 20,000 endpoints safe and secure with Tanium
Jun 18, 2024
In
Tanium
A TrustCloud Trustimonial: DataRobot
Jun 18, 2024
In
TrustCloud
Building a next-gen SOC at Pinewood, a leading MSSP, underpinned by Elastic SIEM
Jun 6, 2024
In
Elastic
How GitGuardian Provides Peace of Mind for Kubefirst
Jun 6, 2024
In
GitGuardian
Blackpoint Cyber & ChaosSearch | Customer Story
Jun 5, 2024
In
ChaosSearch
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.