Skip to main content
Home
About
Organisations
Projects
Tools
Contact
Sponsors Wanted!
Security | Threat Detection | Cyberattacks | DevSecOps | Compliance
The Latest Cybersecurity News & Insights From Around The World
Threat Detection
Application Security
Data Security
Insider Threats
SIEM
SOAR
XDR
Cyberattacks
Hacking
Data Breaches
Malware
Vulnerability
Bots
Fraud
DevSecOps
SecOps
MSSP
SASE
Zero Trust
Incident Response
Remote Work
Compliance
Legislation
NIST
Risk Management
Governance
AST
Penetration Testing
Technology
Cloud
Mobile
API
AI
IoT
Open Source
twitter
facebook
linkedin
GitHub
What Are the Benefits of Using Data Masking Software in Ensuring Security?
How Can E-commerce Businesses Effectively Reduce Return Rates?
Using AI to Build Apps & Automations: Top Cybersecurity Concerns
Putting People First: Inspiring Workplaces recognizes Xalient for its employee-focused approach
Behind the Activation: Exploring KMS pico's Impact on Cybersecurity
Detecting the STRRAT Malware Family
Top 10 Data Governance Tools for 2024
What is Social Engineering in Cybersecurity? A Comprehensive Guide
The Dell API Breach: It could have been prevented
11 BYOD Security Risks & How to Prevent Them
7 Essential Tips to Prevent Social Engineering
8 out of 10 Organizations Experience a Cyber Attack and Attribute Users as the Problem
Verizon: The Human Element is Behind Two-Thirds of Data Breaches
How to navigate the rapid changes and consolidation in the SIEM and security analytics market
What Is Email Spoofing and How to Prevent it?
Implementing Third-Party Risk Management Workflows
11 Third-Party Risk Management Best Practices in 2024
Two new checks for the ChatGPT macOS app
RSA Conference 2024: AI and the Future Of Security
5 Critical SOAR Success Criteria for Enterprise Security Teams
Breaking
Featured Posts
How threat intelligence can improve vulnerability management outcomes
Apr 27, 2024
In
ThreatQuotient
Human risk management automation can help beat burnout
Apr 24, 2024
In
CultureAI
Hacked Creativity? How Cyber Security Threats Impact Artists
Apr 24, 2024
In
SecuritySenses
How MSPs Can Shine As SMEs Demand More Support
Apr 17, 2024
In
JumpCloud
Cloud computing - The first step to an effective data modernisation strategy
Apr 5, 2024
In
Protegrity
The Impact of Evolving Regulation and Compliance on API Security
Mar 22, 2024
In
Noname Security
Network Security Gets Sassy: The Benefits of Unified SASE for the Modern Business
Mar 21, 2024
In
Xalient
Harnessing the value of data with data monetisation
Mar 20, 2024
In
Protegrity
More Posts
Latest News
Putting People First: Inspiring Workplaces recognizes Xalient for its employee-focused approach
May 17, 2024
In
Xalient
How to navigate the rapid changes and consolidation in the SIEM and security analytics market
May 17, 2024
In
Sumo Logic
ManageEngine Endpoint Central takes home 5 Global InfoSec Awards 2024
May 15, 2024
In
ManageEngine
Deepfakes, AI-Manipulated Audio, and Hijacked Social Media Surge in 2024
May 14, 2024
In
Avast
1Password SDKs are now available in beta
May 14, 2024
In
1Password
Splunk Named a Leader in the Gartner Magic Quadrant for SIEM
May 14, 2024
In
Splunk
A Challenger in the 2024 Gartner Magic Quadrant for Security Information and Event Management
May 13, 2024
In
Sumo Logic
Xalient achieves Top 10 in The Sunday Times Best Places to Work Awards
May 10, 2024
In
Xalient
BDRCloud v7.1.0 is Generally Available Now!
May 10, 2024
In
BDRSuite
Exciting Announcement: Introducing Agentless Proxmox Backup and Recovery in BDRSuite!
May 10, 2024
In
BDRSuite
WatchGuard Earns Nine 2024 Top Rated Awards from TrustRadius
May 9, 2024
In
WatchGuard
Tanium Delivers Powerful Solutions Powered by ServiceNow that Reduce Cost and Risk for Customers
May 8, 2024
In
Tanium
Xalient achieves continued compliance with ISO 20000:2018 and expands scope to the Benelux region.
May 8, 2024
In
Xalient
The 2024 Cybersecurity Excellence Awards Recognizes archTIS Products as Winners in Data-centric Security and National Cyber Defense
May 8, 2024
In
archTIS
More News
Latest Blogs
What Are the Benefits of Using Data Masking Software in Ensuring Security?
May 19, 2024
In
SecuritySenses
How Can E-commerce Businesses Effectively Reduce Return Rates?
May 19, 2024
In
SecuritySenses
Using AI to Build Apps & Automations: Top Cybersecurity Concerns
May 18, 2024
In
Zenity
Behind the Activation: Exploring KMS pico's Impact on Cybersecurity
May 17, 2024
In
SecuritySenses
The Dell API Breach: It could have been prevented
May 17, 2024
In
Salt Security
11 BYOD Security Risks & How to Prevent Them
May 17, 2024
In
Teramind
Two new checks for the ChatGPT macOS app
May 17, 2024
In
1Password
RSA Conference 2024: AI and the Future Of Security
May 17, 2024
In
GitGuardian
5 Critical SOAR Success Criteria for Enterprise Security Teams
May 17, 2024
In
Tines
7 Essential Tips to Prevent Social Engineering
May 17, 2024
In
Lookout
Why Static Analysis (SAST) isn't enough to prevent critical bugs in embedded software
May 17, 2024
In
Code Intelligence
8 out of 10 Organizations Experience a Cyber Attack and Attribute Users as the Problem
May 17, 2024
In
KnowBe4
Verizon: The Human Element is Behind Two-Thirds of Data Breaches
May 17, 2024
In
KnowBe4
Detecting the STRRAT Malware Family
May 17, 2024
In
Corelight
What Is Email Spoofing and How to Prevent it?
May 17, 2024
In
Spambrella
Implementing Third-Party Risk Management Workflows
May 17, 2024
In
UpGuard
Top 10 Data Governance Tools for 2024
May 17, 2024
In
Memcyco
11 Third-Party Risk Management Best Practices in 2024
May 17, 2024
In
UpGuard
What is Social Engineering in Cybersecurity? A Comprehensive Guide
May 17, 2024
In
Tanium
Smartphones: The Usual Suspects in Car Accident Cases
May 17, 2024
In
SecuritySenses
More Blogs
Upcoming Events
Latest Customer Stories
Seattle Kraken Deploy WatchGuard's Unified Security Platform
May 15, 2024
In
WatchGuard
o9 Solutions: Optimizing Security Operations with Elastic
May 13, 2024
In
Elastic
How Vana Improved Product Security Without In-House Expertise
May 6, 2024
In
Jit
How Mulesoft fosters a developer-first, shift-left culture with Snyk
Apr 30, 2024
In
Snyk
Securitize integrates Fireblocks to improve its security in the tokenization of real-world assets
Apr 9, 2024
In
Fireblocks
Why Visma chose Aikido Security for its 170+ companies
Mar 28, 2024
In
Aikido
Spoutible Enhances Platform Security through Partnership with Wallarm
Mar 26, 2024
In
Wallarm
How Effortless Solutions Managed Multi-Tiered Client Needs with BoxyHQ SSO
Mar 26, 2024
In
BoxyHQ
Zodia Markets Integrates Fireblocks to Transform Corporate Cross-Border Payments
Mar 14, 2024
In
Fireblocks
Iron Mountain Data Centers' Proactive Approach to Modern Threats with Rubrik
Mar 14, 2024
In
Rubrik
More Customer Stories
Got the
security
buzz
yet?
We collect the latest CyberSecurity news from around the globe and deliver it direct to your inbox.
One email per week, no spam.