Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Non-repudiation: Your Virtual Shield in Cybersecurity
How Face Recognition Vendor Test is being processed
Efficiency at Its Best: Exploring the Advantages of Accounts Payable Outsourcing Services
CISA: Healthcare Organizations Should Be Wary of Increased Ransomware Attacks by ALPHV Blackcat
ISO/SAE 21434 compliance in 2024: what's new and how to act
Threat Context Monthly: Executive intelligence briefing for March 2024
Monitor your secure workloads on Kata Containers with Datadog
PCI DSS Requirement 12 - Changes from v3.2.1 to v4.0 Explained
Cyber Essentials Overview
ConMon: FedRAMP Continuous Monitoring and How It Works
Magic Links vs Passkeys: What's the Difference?
What is OSCAL and Why Does It Matter for NIST and FedRAMP?
NIST CSF V2: What's Hot and What's Not!
Federated Learning for Cybersecurity: Collaborative Intelligence for Threat Detection
What is the PGPA Act 2013? Accountability in the Public Sector
Firmware Monitoring is Just a Snapshot Away
Security Debt: A Growing Threat to Application Security
Bipartisan AI Task Force and More - This Month in AI
Understanding Denial of Service Attacks: Prevention and Response Strategies
Exploring the risks of eye-tracking technology in VR security
Breaking
Featured Posts
Utilities and Energy a Prime Target For API Security Incidents
Mar 15, 2024
In
Noname Security
SMEs Invest in Tech Opportunities but Risk Missing Security Safeguards
Mar 14, 2024
In
JumpCloud
Sponsored By KONDUKTO
Running DAST in CI/CD for Regression Testing
Feb 29, 2024
In
Kondukto
How Telecommunications Providers Can Best Tackle DDoS Attacks
Feb 19, 2024
In
A10 Networks
Leveraging Threat Intelligence for Regulatory Compliance
Feb 16, 2024
In
ThreatQuotient
Sponsored By EVENTSENTRY
It's Not Black Magic: Malware & Ransomware in Plain English
Feb 12, 2024
In
EventSentry
Quantum computing: The data security conundrum
Feb 6, 2024
In
Protegrity
Why Identity is the Cornerstone of a Zero Trust Architecture
Jan 31, 2024
In
Xalient
More Posts
Latest News
BDRSuite Won the PAC Award at the CPExpo 2024
Mar 14, 2024
In
BDRSuite
Nightfall AI releases GenAI-powered Sensitive Data Protection for the enterprise
Mar 14, 2024
In
Nightfall
Introducing Bandwidth Control
Mar 14, 2024
In
Netskope
Trustwave Named a Representative Vendor in 2024 Gartner Market Guide for Co-Managed Security Monitoring Services
Mar 14, 2024
In
Trustwave
The State of Secrets Sprawl 2024
Mar 12, 2024
In
GitGuardian
archTIS Recognized as a 2024 Microsoft Security Excellence Awards Finalist for Compliance & Privacy Trailblazer
Mar 12, 2024
In
archTIS
Nightfall AI Transforms Enterprise DLP with AI-Native Platform
Mar 11, 2024
In
Nightfall
Customers Rate Sysdig 5 Out of 5 in Gartner Voice of the Customer for Cloud Security Posture Management Tools
Mar 7, 2024
In
Sysdig
Magic Cloud Networking simplifies security, connectivity, and management of public clouds
Mar 6, 2024
In
Cloudflare
Xalient's Triple Triumph: FT1000 Europe Recognises Three Years of Growth Excellence
Mar 5, 2024
In
Xalient
TrustCloud Welcomes Security and Compliance Expert Dixon Wright as VP GRC Transformation
Mar 5, 2024
In
TrustCloud
Introducing the Salt Developer Portal: Unleash the Power of Automating API Security
Mar 5, 2024
In
Salt Security
Bearer Entered into an Agreement to be Acquired by Cycode
Mar 5, 2024
In
Bearer
CRN Recognizes WatchGuard in its Prestigious 2024 Security 100 List
Mar 5, 2024
In
WatchGuard
More News
Latest Blogs
Non-repudiation: Your Virtual Shield in Cybersecurity
Jan 18, 2038
In
Tripwire
How Face Recognition Vendor Test is being processed
Mar 18, 2024
In
SecuritySenses
Efficiency at Its Best: Exploring the Advantages of Accounts Payable Outsourcing Services
Mar 18, 2024
In
SecuritySenses
Bipartisan AI Task Force and More - This Month in AI
Mar 18, 2024
In
Protecto
What is the PGPA Act 2013? Accountability in the Public Sector
Mar 18, 2024
In
UpGuard
Understanding Denial of Service Attacks: Prevention and Response Strategies
Mar 18, 2024
In
Device Authority
Exploring the risks of eye-tracking technology in VR security
Mar 18, 2024
In
AT&T Cybersecurity
CISA: Healthcare Organizations Should Be Wary of Increased Ransomware Attacks by ALPHV Blackcat
Mar 18, 2024
In
KnowBe4
5 Best Practices to Secure Azure Resources
Mar 18, 2024
In
CrowdStrike
Elevating a Housing Association's Security Posture with Managed XDR for Microsoft
Mar 18, 2024
In
Kroll
Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.
Mar 18, 2024
In
Nightfall
Threat Context Monthly: Executive intelligence briefing for March 2024
Mar 18, 2024
In
Outpost 24
Top 5 Data Breaches That Cost Millions
Mar 18, 2024
In
Wallarm
PCI DSS Requirement 12 - Changes from v3.2.1 to v4.0 Explained
Mar 18, 2024
In
VISTA InfoSec
Understanding ITAR Compliance: A Guide for Australian Companies
Mar 18, 2024
In
archTIS
ConMon: FedRAMP Continuous Monitoring and How It Works
Mar 18, 2024
In
Ignyte
ISO/SAE 21434 compliance in 2024: what's new and how to act
Mar 18, 2024
In
Code Intelligence
What is OSCAL and Why Does It Matter for NIST and FedRAMP?
Mar 18, 2024
In
Ignyte
Monitor your secure workloads on Kata Containers with Datadog
Mar 18, 2024
In
Datadog
Federated Learning for Cybersecurity: Collaborative Intelligence for Threat Detection
Mar 18, 2024
In
Tripwire
More Blogs
Upcoming Events
Latest Customer Stories
Zodia Markets Integrates Fireblocks to Transform Corporate Cross-Border Payments
Mar 14, 2024
In
Fireblocks
Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik
Mar 14, 2024
In
Rubrik
Achieving Seamless SSO Integration: Why BlockSurvey Selected BoxyHQ
Mar 8, 2024
In
BoxyHQ
Leveraging BoxyHQ's Open-Source SSO for Greater Market Reach and Compliance: MonkeyFit
Feb 28, 2024
In
BoxyHQ
How REI built a DevSecOps culture and how Snyk helped
Feb 27, 2024
In
Snyk
Sumo Logic & Gigamon -- Three Top Security Use Cases
Feb 27, 2024
In
Sumo Logic
Unlocking Efficiency with Enterprise SSO: A Unosecur Case Study
Feb 15, 2024
In
BoxyHQ
Customer Testimonial: Horiens Reduces Supply Chain Risk With SecurityScorecard
Jan 29, 2024
In
SecurityScorecard
XYZ Teknoloji Launches Compliant Digital Asset Solution for Banks and Financial Institutions using Fireblocks
Jan 10, 2024
In
Fireblocks
Kroger's approach to supply chain security
Jan 2, 2024
In
Snyk
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.