Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Source for News & Information on Security Applications & Tools
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
ManageEngine is positioned as a Niche Player in 2022 Gartner Magic Quadrant for Privileged Access Management
ManageEngine Positioned in 2022 Gartner® Magic Quadrant for Unified Endpoint Management Tools and Magic Quadrant for Privileged Access Management
Data Security Controls: Six Types and How to Implement Them
I'm a former nation-state exploiter - here's why I know Open Security is our best defense
Watch out for this zip file scam
Rezilion Releases MI-X, A New Open Source Vulnerability Validation Tool
Seven Steps the Healthcare Industry Must Take to Protect Against Cyberattacks
Securing Your Snowflake Database with Teleport Database Access
Importance of Cloud Security
How Hacking Has Evolved Over Time
Empower Users to Securely Access and Share Data
Addressing Insider Risk with Netskope Intelligent SSE
Introducing Snyk Training, our online learning platform
How to Back Up Your Data: 6 Effective Strategies to Prevent Data Loss
Singapore's PDPA Penalties Set to Increase Starting Oct 1
How to reduce your exposure & secure your data in the cloud in 5 quick ways
Twilio Suffers a Data Breach After Employees Tricked by SMS Phishing Attack
Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference
CrowdStrike Introduces Industry's First AI-Powered Indicators of Attack for CrowdStrike Falcon Platform to Uncover the Most Advanced Attacks
ManageEngine has been recognized once again in the Gartner Magic Quadrant for Unified Endpoint Management
Breaking
Featured Posts
Sponsored By TORQ
An Introduction to Automation Basics
Aug 5, 2022
In
Torq
Three Hard Truths About Organizational Cybersecurity
Jul 20, 2022
In
Keeper
Sponsored By PENTEST PEOPLE
The Beginning of Ransomware
Jul 18, 2022
In
Pentest People
Sponsored By CYBRIANT
How Your Business Can Benefit from Cyber Threat Intelligence
Jul 14, 2022
In
Cybriant
Sponsored By TORQ
Automated Security Alert Remediation: A Closer Look
Jul 9, 2022
In
Torq
Sponsored By CLOUDFABRIX
How Modern Log Intelligence Meets New Cybersecurity Regulations by CERT-In
Jul 9, 2022
In
CloudFabrix
Security risks from the 'hybrid holiday'
Jul 5, 2022
In
ManageEngine
How to decide what to fix when you can't fix everything
Jun 17, 2022
In
Snyk
More Posts
Latest News
ManageEngine is positioned as a Niche Player in 2022 Gartner Magic Quadrant for Privileged Access Management
Aug 11, 2022
In
ManageEngine
Rezilion Releases MI-X, A New Open Source Vulnerability Validation Tool
Aug 11, 2022
In
Rezilion
Bugcrowd Taps Top Hackers for Live Hacking Event with Indeed at 2022 Black Hat Conference
Aug 10, 2022
CrowdStrike Introduces Industry's First AI-Powered Indicators of Attack for CrowdStrike Falcon Platform to Uncover the Most Advanced Attacks
Aug 10, 2022
In
CrowdStrike
ManageEngine has been recognized once again in the Gartner Magic Quadrant for Unified Endpoint Management
Aug 10, 2022
In
ManageEngine
1Password named one of Forbes Cloud 100
Aug 10, 2022
In
1Password
Nightfall AI Raises $40 Million Series B to Expand Cloud Data Protection Platform
Aug 10, 2022
In
Nightfall
Simplifying Software Security: Veracode Enhances Frictionless Experience For Developers
Aug 9, 2022
In
Veracode
Rubrik Ranked #31 on the 2022 Forbes Cloud 100
Aug 9, 2022
In
Rubrik
Keeper Security in the 2022 Gartner Magic Quadrant for Privileged Access Management
Aug 9, 2022
In
Keeper
Say hello to 1Password 8 for iOS and Android
Aug 9, 2022
In
1Password
Snyk ranked #20 on 2022 Forbes Cloud 100 list
Aug 9, 2022
In
Snyk
Introducing Snyk Auto-Issues for Jira: a new open source application for automated issue creation
Aug 9, 2022
In
Snyk
Arctic Wolf Hailed as a Leader for Innovation, Culture and Business Growth by Prestigious National Awards
Aug 9, 2022
In
Arctic Wolf
More News
Latest Blogs
ManageEngine Positioned in 2022 Gartner® Magic Quadrant for Unified Endpoint Management Tools and Magic Quadrant for Privileged Access Management
Aug 11, 2022
In
ManageEngine
Data Security Controls: Six Types and How to Implement Them
Aug 11, 2022
In
Bearer
I'm a former nation-state exploiter - here's why I know Open Security is our best defense
Aug 11, 2022
In
Elastic
Watch out for this zip file scam
Aug 11, 2022
In
Egress
Seven Steps the Healthcare Industry Must Take to Protect Against Cyberattacks
Aug 11, 2022
In
Trustwave
Securing Your Snowflake Database with Teleport Database Access
Aug 11, 2022
In
Teleport
Importance of Cloud Security
Aug 11, 2022
In
SecurityScorecard
How Hacking Has Evolved Over Time
Aug 11, 2022
In
Arctic Wolf
Empower Users to Securely Access and Share Data
Aug 11, 2022
In
Egnyte
Singapore's PDPA Penalties Set to Increase Starting Oct 1
Aug 11, 2022
In
archTIS
Addressing Insider Risk with Netskope Intelligent SSE
Aug 11, 2022
In
Netskope
How to reduce your exposure & secure your data in the cloud in 5 quick ways
Aug 11, 2022
In
AT&T Cybersecurity
Introducing Snyk Training, our online learning platform
Aug 11, 2022
In
Snyk
Twilio Suffers a Data Breach After Employees Tricked by SMS Phishing Attack
Aug 11, 2022
In
ImmuniWeb
How to Back Up Your Data: 6 Effective Strategies to Prevent Data Loss
Aug 11, 2022
In
UpGuard
How Small Businesses Can Defend Against Common Cyberattacks
Aug 10, 2022
In
SecureAge
Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever
Aug 10, 2022
In
CrowdStrike
Convergence and adoption of AI and ML countering the cyber threat
Aug 10, 2022
In
Tripwire
The Top 3 Cybersecurity Threats and How to Overcome Them
Aug 10, 2022
In
Arctic Wolf
CVE-2022-20842 & CVE-2022-20827 - Critical Vulnerabilities in Cisco Small Business Routers
Aug 10, 2022
In
Arctic Wolf
More Blogs
Upcoming Events
Latest Customer Stories
GBBN makes end users happier and more productive with Egnyte rollout
Aug 9, 2022
In
Egnyte
How Egnyte Handles API Mocking: A Mirage.js Case Study
Aug 8, 2022
In
Egnyte
Improving developer experience with security tools at Pinterest
Jul 14, 2022
In
Snyk
A day In The life of a Fashion Products Company CISO - Vikas Yadav
Jun 29, 2022
In
Snyk
New Netskope Customer, United States Patent and Trademark Office (USPTO), Leads the Way in Security Modernization with First Ever US Federal Civilian SASE Contract
Jun 28, 2022
In
Netskope
Preqin Moves to Secure Cloud File Sharing with Egnyte
Jun 23, 2022
In
Egnyte
RedAbierta chooses INETCO BullzAI to secure its payment channels
Jun 22, 2022
In
INETCO
Royal Flying Doctor Service Queensland Protects The Crown Jewels of Patient & Aviation Data
Jun 16, 2022
In
Rubrik
NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats
Jun 10, 2022
In
Rubrik
Case Study: The Compatibility Challenge of Using Outside Software in Product Development
Jun 9, 2022
In
Rezilion
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.