Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin's Q2 Stadium and virtually worldwide.

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q1-Q2 2025 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2025, and businesses need to act fast to protect themselves from this evolving threat. The report reveals a significant escalation in the total number of DDoS attacks and their magnitude, measured in terabits per second (Tbps).

Black box penetration testing: pros and cons

Black box penetration testing is one method among many potential approaches to securing systems, applications, networks and cloud environments. As with anything, it has pros and cons. Black box penetration testing involves assessing an asset without any prior knowledge or access to its internals, for example authenticated features, application code, user credentials or network architecture.

Breaking into Cybersecurity with Motti Tal: From Code to Cyber Strategies

In this episode of Breaking Into Cybersecurity's latest episode, featuring Motti Tal, CSO at Memcyco. Motti shares his journey from studying computer science at Tel Aviv University to programming for the Israeli Navy and eventually moving into software and cybersecurity. He discusses the evolution of his career, how AI influences critical thinking, and the importance of innovative thinking in cybersecurity.

Graylog SIEM on AWS | Smarter Security Without Compromise

Choosing a SIEM doesn’t have to mean trade-offs. This video shows how Graylog SIEM on AWS delivers fast detection, predictable costs, and analyst-friendly workflows — without the compromises that hold legacy platforms back. Legacy ingest-based SIEMs force security teams to pick between visibility, cost, and analyst efficiency. Graylog changes that model with flat, transparent pricing, license-free data lake storage, and flexible deployment options.

Master quantitative risk analysis: A step-by-step guide for better business decisions

Risk is an ever-present factor in business, influencing almost every decision that organizations make. From investments and operations to market expansion and product development, every decision carries with it inherent risks that could either be mitigated or amplified based on how well they are understood and managed. Quantitative risk analysis offers a structured, data-driven approach to assess these risks, paving the way toward more informed and resilient business decisions.

Keeper Webinar - From Passwords to Privileged Access: How KeeperPAM Secures It All

Watch the recording of our exclusive webinar featuring Craig Lurey, CTO & Co-founder of Keeper Security. Discover how KeeperPAM is revolutionizing privileged access management by seeing a walkthrough of the newest KeeperPAM and Endpoint Privilege Manager features in this live demo showcasing its functionality.

The Surprising Benefits of AuditFusion360 for Your Business

Every year, businesses worldwide spend millions of dollars and countless hours on compliance audits — PCI DSS, GDPR, HIPAA, SOC 2, ISO 27001, DORA, SOX, CCPA… the list keeps growing. But here’s the problem: most organizations run these audits separately. That means: Multiple auditors Repeated testing Overlapping documentation Skyrocketing costs In fact, studies show that companies waste up to 40% of their compliance budgets on duplicated audit work. That’s not just expensive — it’s inefficient.

BlueVoyant Adopts a New Naming Convention to Bring Clarity to Cyber Threat Analysis

The lack of a universal standard for naming threat actors often creates confusion in the cybersecurity community. The same threat actor can be identified by multiple aliases depending on the vendor or team tracking it. For example, a Russian government-sponsored cyber threat group is referred to alternatively as “APT29”, “Cozy Bear”, “Midnight Blizzard” and “Nobelium”.