Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
Unleash the power of unified network management and security in OpManager with the Firewall Analyzer add-on
Intelligent Payment Routing: Why we need it?
Reduce Operational Complexity with Splunk SOAR Logic Loops
Adding Multiple Watermarks to Protect IP in Microsoft Office Documents
Cyber Attacks and Data Breaches Cited as the Number One Business Risk for Organizations
Leveraging OpenAPI as a Core Element of API and Application Security
How to Seize FSMO Roles
Unlock the Power of Your SIEM with Co-Managed SOC
Strengthening Cybersecurity Resilience: Key Insights from the 2023 ISC2 Cybersecurity Workforce Study
Phishing Defense: Train Often to Avoid the Bait
Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business
Tines vs Python: Understanding alternative approaches to automation
A Guide to Third-Party Risk Management in the Financial Sector
Why SIEM Is Not Right for SaaS Security
Ekran System's Cyber Essentials Certification: Enhanced Software & Supply Chain Security
Utilizing COBIT 5 for Vendor Risk Management
What are ESG Frameworks? Corporate Sustainability & ESG Risks
Breaking
Featured Posts
How Unsecured APIs Can Eat Up Retail Revenue
Dec 7, 2023
In
Noname Security
Looking to 2024: Data, AI and security will be top priorities for businesses
Dec 5, 2023
In
Protegrity
Sponsored By KONDUKTO
Container Security: A Quick Overview
Nov 27, 2023
In
Kondukto
APIs - The Hidden Cause of Data Breaches
Nov 16, 2023
In
Noname Security
API Security Threats Rising As Confidence Also Increases
Nov 8, 2023
In
Noname Security
Sponsored By EVENTSENTRY
EventSentry v5.1: Anomaly Detection / Permission Inventory / Training Courses & More!
Nov 2, 2023
In
EventSentry
Sponsored By KONDUKTO
How to Streamline Vulnerability Management
Oct 27, 2023
In
Kondukto
Proactively Preventing Your Company from Becoming the Next Cyberattack Headline
Oct 18, 2023
In
11:11 Systems
More Posts
Latest News
Introducing Bearer Assistant
Dec 7, 2023
In
Bearer
Synopsys named as a Customers' Choice in the 2023 Gartner Peer Insights Voice of the Customer for Application Security Testing
Dec 7, 2023
In
Synopsys
WatchGuard Threat Lab Report Shows Rise in Threat Actors Exploiting Remote Access Software
Dec 6, 2023
In
WatchGuard
Centripetal Partners With Tiger to Provide Cutting-Edge Cybersecurity Innovation to the UK Market for the First Time
Dec 5, 2023
In
Centripetal
Introducing new products to secure and accelerate an AI-powered future
Dec 5, 2023
In
Vanta
Appknox Stands Out in Gartner's 2023 'Voice of the Customer' for Application Security Testing
Dec 5, 2023
In
Appknox
Snyk named a 2023 Gartner Peer Insights Customers' Choice for Application Security Testing
Dec 4, 2023
In
Snyk
Kubernetes 1.29: The Security Perspective
Dec 3, 2023
In
ARMO
WatchGuard Threat Lab Analysts Release 2024 Cybersecurity Predictions
Nov 29, 2023
In
WatchGuard
Egress enhances cloud email security offering with advanced graymail detection to improve employee productivity and reduce admin overhead
Nov 29, 2023
In
Egress
Ensuring your M&A delivers on its promise
Nov 29, 2023
In
Xalient
Fireblocks Launches Off Exchange to Eliminate Counterparty Risk
Nov 28, 2023
In
Fireblocks
Announcing Tanium Guardian
Nov 27, 2023
In
Tanium
Keeper Security Government Cloud Lands Three ASTORS Homeland Security Awards
Nov 27, 2023
In
Keeper
More News
Latest Blogs
Unleash the power of unified network management and security in OpManager with the Firewall Analyzer add-on
Dec 8, 2023
In
ManageEngine
Intelligent Payment Routing: Why we need it?
Dec 8, 2023
In
SecuritySenses
How to Seize FSMO Roles
Dec 8, 2023
In
Netwrix
Unlock the Power of Your SIEM with Co-Managed SOC
Dec 8, 2023
In
Trustwave
Strengthening Cybersecurity Resilience: Key Insights from the 2023 ISC2 Cybersecurity Workforce Study
Dec 8, 2023
In
11:11 Systems
Ekran System's Cyber Essentials Certification: Enhanced Software & Supply Chain Security
Dec 8, 2023
In
Ekran
Why SIEM Is Not Right for SaaS Security
Dec 8, 2023
In
Arctic Wolf
Utilizing COBIT 5 for Vendor Risk Management
Dec 8, 2023
In
UpGuard
What are ESG Frameworks? Corporate Sustainability & ESG Risks
Dec 8, 2023
In
UpGuard
Phishing Defense: Train Often to Avoid the Bait
Dec 8, 2023
In
KnowBe4
Reduce Operational Complexity with Splunk SOAR Logic Loops
Dec 8, 2023
In
Splunk
Nearly Every CIO Identifies at Least One Cyber Threat as a Risk to their Business
Dec 8, 2023
In
KnowBe4
Adding Multiple Watermarks to Protect IP in Microsoft Office Documents
Dec 8, 2023
In
archTIS
Tines vs Python: Understanding alternative approaches to automation
Dec 8, 2023
In
Tines
Cyber Attacks and Data Breaches Cited as the Number One Business Risk for Organizations
Dec 8, 2023
In
KnowBe4
A Guide to Third-Party Risk Management in the Financial Sector
Dec 8, 2023
In
UpGuard
Leveraging OpenAPI as a Core Element of API and Application Security
Dec 8, 2023
In
Graylog
Maximizing Efficiency: The Significance of TDM for Sensitive Data
Dec 7, 2023
In
SecuritySenses
Top tips: 4 hacks you should try now to keep your text messages secure
Dec 7, 2023
In
ManageEngine
From Clicks to Chaos: The Rise of Crowd-Sourced Cyber Attacks
Dec 7, 2023
In
Cyberint
More Blogs
Upcoming Events
Latest Customer Stories
Secure by Default: Integrating GitGuardian in Vermeer's Software Development Lifecycle
Nov 20, 2023
In
GitGuardian
A TrustCloud Trustimonial: Gremlin
Nov 14, 2023
In
TrustCloud
Why Pete Matheson Recommends Keeper
Nov 4, 2023
In
Keeper
Mend.io Customer Success Story - WTW
Nov 2, 2023
In
Mend
Rubrik + PepsiCo
Nov 1, 2023
In
Rubrik
Why Sandra Liu Recommends Keeper
Oct 25, 2023
In
Keeper
1Password monitors, detects, and responds to threats with Datadog Cloud SIEM #applicationsecurity
Oct 20, 2023
In
Datadog
Indigov's security team uses Datadog Cloud SIEM & Log Management to reduce mean time to respond
Oct 19, 2023
In
Datadog
DevOps and dev teams at 1Password are empowered to own their infrastructure with Datadog
Oct 19, 2023
In
Datadog
Why Ivan Kam Stores His Passwords in Keeper
Oct 19, 2023
In
Keeper
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.