Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
linkedin
Bluesky
GitHub
New cybersecurity threat-focused reports from ENISA
Why GenAI Should Be a Deciding Factor With Email Security Investments
PowerShell Environment Variables
Snyk Security Labs Testing Update: Cursor.com AI Code Editor
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
The Database Slayer: Deep Dive and Simulation of the Xbash Malware
Fireblock's Off Exchange Eliminates Counterparty Risk and Promotes Transparency
The Tron Ledger: Revolutionizing how we access entertainment and content sharing
Budgeting and Forecasting: Your Roadmap to Financial Resilience
IEEE 802.3bt - Making Device Management in Smart Buildings Better
Ransomware Annual Report 2024
CISO predictions: What does 2025 hold for attack surface management (ASM)?
Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks
Is Facebook Marketplace Really Safe? Find Out
Endpoint Management: Best Practices to Secure Every Device Across Your Network
Emerging Threat: Ivanti Connect Secure CVE-2025-0282 and CVE-2025-0283
The $55 Billion Wake-Up Call: Cybersecurity Challenges Facing UK Businesses
What Is Vulnerability Management?
Create Instant, Scalable, and Cost-Effective Value for MSSP Customers
Breaking
Featured Posts
2025 Predictions - Navigating Through the Challenges and Opportunities Ahead
Jan 9, 2025
In
Protegrity
Sponsored By EVENTSENTRY
Capturing Network Traffic anytime
Jan 1, 2025
In
EventSentry
Navigating the Evolving Threat Intelligence Landscape and Organisational Responsibility
Dec 18, 2024
In
ThreatQuotient
The Key Steps to Ensuring DORA Compliance
Dec 13, 2024
In
Protegrity
2025 - A Year of Perpetual Change
Dec 6, 2024
In
JumpCloud
The Role of Data Security in Protecting Sensitive Information Across the Finance Industry
Nov 30, 2024
In
Protegrity
The Role of Data Recovery in Cyber Resilience
Nov 19, 2024
In
11:11 Systems
Building a Modern Identity Capability to Tackle DORA
Nov 13, 2024
In
JumpCloud
More Posts
Latest News
Snyk Recognized as Trusted Partner and Innovator by JPMorganChase
Jan 14, 2025
In
Snyk
Code Intelligence Launches Spark, Its AI Test Agent That Autonomously Uncovers Vulnerabilities Without Human Interaction
Jan 9, 2025
In
Code Intelligence
WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services
Jan 8, 2025
In
WatchGuard
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
Jan 7, 2025
Security Risk Advisors joins the Microsoft Intelligent Security Association
Jan 7, 2025
1Password acquires Trelica, a trailblazer in SaaS access management
Jan 7, 2025
In
1Password
Egnyte Wins Big With Nine Comparably Awards in 2024
Jan 7, 2025
In
Egnyte
Feature Announcement: Enhancing ARMO Platform's Threat Detection and Response
Jan 7, 2025
In
ARMO
Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis
Jan 6, 2025
In
Veracode
Sysdig is recognized as a Customers' Choice in Gartner Voice of the Customer for Cloud-Native Application Protection Platforms
Jan 6, 2025
In
Sysdig
SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
Dec 30, 2024
First ever Magic Quadrant for Email Security Platforms by Gartner
Dec 19, 2024
In
Egress
CrowdStrike Earns AAA Award, 100% Total Accuracy Score in SE Labs Q3 Enterprise Advanced Security Test
Dec 18, 2024
In
CrowdStrike
More News
Latest Blogs
Why GenAI Should Be a Deciding Factor With Email Security Investments
Jan 15, 2025
In
Spambrella
New cybersecurity threat-focused reports from ENISA
Jan 15, 2025
In
Obrela
The Database Slayer: Deep Dive and Simulation of the Xbash Malware
Jan 14, 2025
In
Trustwave
Fireblock's Off Exchange Eliminates Counterparty Risk and Promotes Transparency
Jan 14, 2025
In
Fireblocks
PowerShell Environment Variables
Jan 14, 2025
In
Netwrix
Snyk Security Labs Testing Update: Cursor.com AI Code Editor
Jan 14, 2025
In
Snyk
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
Jan 14, 2025
In
SecurityScorecard
The Tron Ledger: Revolutionizing how we access entertainment and content sharing
Jan 14, 2025
In
SecuritySenses
Budgeting and Forecasting: Your Roadmap to Financial Resilience
Jan 14, 2025
In
SecuritySenses
IEEE 802.3bt - Making Device Management in Smart Buildings Better
Jan 14, 2025
In
SecuritySenses
What Is Vulnerability Management?
Jan 13, 2025
In
Tripwire
Create Instant, Scalable, and Cost-Effective Value for MSSP Customers
Jan 13, 2025
In
LimaCharlie
CVSS 3.1 vs CVSS 4.0: A Look at the Data
Jan 13, 2025
In
Mend
Deepfakes, Shallow Morals: The Real Issue Behind the UK's Crackdown
Jan 13, 2025
In
KnowBe4
Single sign-on (SSO), simplify access and protect your business
Jan 13, 2025
In
WatchGuard
How to Install VMware Tools on Linux, Windows, MacOS, FreeBSD and Solaris
Jan 13, 2025
In
NAKIVO
Ransomware Annual Report 2024
Jan 13, 2025
In
Cyberint
CISO predictions: What does 2025 hold for attack surface management (ASM)?
Jan 13, 2025
In
Outpost 24
New in Vanta | January 2025
Jan 13, 2025
In
Vanta
Multi-factor Authentication for Active Directory: Fighting MFA Fatigue Attacks
Jan 13, 2025
In
Fidelis Security
More Blogs
Upcoming Events
Latest Customer Stories
Managing identities in a growing organization: Lessons from SECURA Insurance
Jan 6, 2025
In
One Identity
How Data Net Solutions Group Found IT Success with 11:11 Systems
Nov 15, 2024
In
11:11 Systems
How Bot Expertise Stopped the Google Translate Bot Proxy Technique
Nov 13, 2024
In
Netacea
How ARMO Reduced Secrets Exposure with GitGuardian
Nov 12, 2024
In
GitGuardian
Visma's Security Boost with Aikido: A Conversation with Nikolai Brogaard
Nov 6, 2024
In
Aikido
How Clasp Consolidated Product Security Tooling with Jit
Oct 14, 2024
In
Jit
TDK Electronics Goes from Complexity to Confidence with CrowdStrike
Oct 7, 2024
In
CrowdStrike
Gamuda Transforms IT Operations with Cato Networks
Sep 24, 2024
In
Cato Networks
How Investronaut Secured Digital Transformation with CyberArk Identity Solutions | CyberArk
Sep 23, 2024
In
CyberArk
JP | Customer Corner: "How BigCommerce Achieved Real-Time Cloud Security"
Sep 13, 2024
In
Sysdig
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.