Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
How Can I Help My Elderly Relatives Remember Passwords?
Data Privacy Day 2023 - How Cyber Can Lead the Charge in User Protection
Software risks and technical debt: The role of process in determining good software
Adding security to Nuxt 3
Data Protection Day 2023: Misaligned Policy Priorities Complicate Data Protection Compliance
Security Questionnaires Explained: How to Respond to the Most Common Questions
How to Reduce Insider Threat Risks in a Hybrid Office: 10 Best Practices
Data Privacy Day: Understanding the Risks of Social Media
5 Tips To Keep in Mind for Data Privacy Day
Covenant C2 Fills the Void Left by Empire PowerShell
App Security & Compliance for SaaS Companies in Saudi Arabian Market
Data Privacy Laws Organizations Cannot Ignore in 2023
Identifying and securing your business's dark data assets in the cloud
How the 1Password Starter Kit items keep you secure
Weekly Cyber Security News 27/01/2023
Tips for Better Password Management
Introducing the ability to build apps with Tines
Where is Your Risk? Software License Compliance and Other Non-Vulnerability Risk
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
How Local Governments Can Increase Their Security Posture on a Budget
Breaking
Featured Posts
Sponsored By KONDUKTO
OpenAI (ChatGPT) Vulnerability Remediation Concept Work
Jan 23, 2023
In
Kondukto
Sponsored By EVENTSENTRY
The Life of the Sysadmin: A Patch Tuesday Story
Jan 20, 2023
In
EventSentry
Sponsored By CYBRIANT
6 App Security Tips to Keep Your Application Secure
Jan 17, 2023
In
Cybriant
Sponsored By PENTEST PEOPLE
Phishing Alert: How to Identify and Avoid Phishing Attacks
Dec 15, 2022
In
Pentest People
Sponsored By CYBRIANT
The Payment Card Industry Data Security Standard
Dec 14, 2022
In
Cybriant
JUMPSEC works on a prototype lightweight anomaly detection system
Dec 13, 2022
In
JUMPSEC
Into the future: what might cybersecurity look like in 2023?
Dec 12, 2022
In
Keeper
How the cloud makes cybersecurity stronger
Dec 9, 2022
In
CrowdStrike
More Posts
Latest News
Black Duck's New Year's Resolution
Jan 26, 2023
In
Synopsys
New Study Examines Application Connectivity Security in the Cloud
Jan 25, 2023
In
AlgoSec
Forward Networks Raises $50M in Series D Funding, Achieves 139% Year-over-Year Growth
Jan 24, 2023
In
Forward Networks
Device Authority and Entrust Demonstrate Their Partnership Potential to Provide Security to the Supply Chain
Jan 24, 2023
In
Device Authority
Snyk enhances ServiceNow with comprehensive insights into vulnerabilities in open source software
Jan 24, 2023
In
Snyk
Trustwave Achieves Microsoft Cloud Security Partner Accreditation Specializing in Threat Protection
Jan 24, 2023
In
Trustwave
Torq Achieves 800% Revenue Growth and 10x Customer Growth Across 2022, and 1,000,000+ Daily Security Automations
Jan 23, 2023
In
Torq
AT&T Cybersecurity awarded the Palo Alto Networks 2022 Partner of the Year Award
Jan 20, 2023
In
AT&T Cybersecurity
Crossword Cybersecurity partners with BCS, The Chartered Institute for IT
Jan 19, 2023
Nightfall Enables Advanced Secret Detection with Enhanced Machine Learning API Key Detector
Jan 19, 2023
In
Nightfall
Nightfall's New PHI Detector Improves Security Automation for Healthcare Orgs
Jan 19, 2023
In
Nightfall
Sysdig a Leader in Frost Radar, CNAPP 2022
Jan 19, 2023
In
Sysdig
Databarracks launches Business Continuity Incident Response service
Jan 18, 2023
CREST and Hack The Box launch CREST certification-aligned penetration testing training labs
Jan 18, 2023
More News
Latest Blogs
How the 1Password Starter Kit items keep you secure
Jan 27, 2023
In
1Password
Weekly Cyber Security News 27/01/2023
Jan 27, 2023
In
ionCube24
Tips for Better Password Management
Jan 27, 2023
In
Netwrix
How Can I Help My Elderly Relatives Remember Passwords?
Jan 27, 2023
In
Keeper
Data Privacy Day 2023 - How Cyber Can Lead the Charge in User Protection
Jan 27, 2023
In
Arctic Wolf
Software risks and technical debt: The role of process in determining good software
Jan 27, 2023
In
Synopsys
Adding security to Nuxt 3
Jan 27, 2023
In
Snyk
Data Protection Day 2023: Misaligned Policy Priorities Complicate Data Protection Compliance
Jan 27, 2023
In
CrowdStrike
Security Questionnaires Explained: How to Respond to the Most Common Questions
Jan 27, 2023
In
Kintent
How to Reduce Insider Threat Risks in a Hybrid Office: 10 Best Practices
Jan 27, 2023
In
Ekran
App Security & Compliance for SaaS Companies in Saudi Arabian Market
Jan 27, 2023
In
Indusface
Data Privacy Day: Understanding the Risks of Social Media
Jan 27, 2023
In
Tripwire
Data Privacy Laws Organizations Cannot Ignore in 2023
Jan 27, 2023
In
Appknox
5 Tips To Keep in Mind for Data Privacy Day
Jan 27, 2023
In
Netskope
Covenant C2 Fills the Void Left by Empire PowerShell
Jan 27, 2023
In
Netwrix
Identifying and securing your business's dark data assets in the cloud
Jan 27, 2023
In
AT&T Cybersecurity
NewEdge is a SASE-ready Infrastructure that is Second to None
Jan 26, 2023
In
Netskope
Introducing the ability to build apps with Tines
Jan 26, 2023
In
Tines
Where is Your Risk? Software License Compliance and Other Non-Vulnerability Risk
Jan 26, 2023
In
Rezilion
How Did Red Cross Get Hacked?
Jan 26, 2023
In
UpGuard
More Blogs
Upcoming Events
Latest Customer Stories
Visibility Helps Global Energy Company AES Assess Risk and Secure its OT Networks
Jan 17, 2023
In
Forescout
How S&P Global Uses a Digital Twin to Deliver Business Value Faster
Jan 11, 2023
In
Forward Networks
Tabit Addresses API Vulnerabilities Before Major Exploit
Jan 5, 2023
In
Noname Security
Case study: How Mulligan Funding built a SOC 2-compliant fintech SaaS platform with Calico Cloud
Jan 5, 2023
In
Tigera
Case Study: Manufacturer Tackles Complexity
Dec 26, 2022
In
Rezilion
SOAR'ing to Success: How an Insurance Company Automates Threat Hunting
Dec 13, 2022
In
Devo
Online Retailer Checks Out Rezilion, Solves Vulnerability Backlog Burden
Dec 13, 2022
In
Rezilion
How T-Mobile uses Open Policy Agent
Dec 13, 2022
In
Styra
AWS re:Invent 2022: How Neiman Marcus transitioned to developer-first security
Dec 12, 2022
In
Snyk
Spotlight on CRED: Benchmarking security with a BSIMM assessment
Nov 17, 2022
In
Synopsys
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.