[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
StackAware and A-LIGN join forces to drive AI governance through ISO 42001 certification
Getting patients to better doctors, faster with generative AI
ISO 42001 vs. HITRUST AI security certification
New York State Department of Financial Services guidance on AI security and governance
IQNOX partners with StackAware to strengthen AI governance
Why logging into ChatGPT reduces AI risk
5 key players in the ISO 42001 certification process
3 ways ISO 42001 can help AI-powered companies comply with California's training data transparency bill (AB-2013)
Yes, you are using AI
3 business reasons I am staying opted-in to LinkedIn's generative AI training
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
📡 TCP #66: Snyk x Probely; State of SaaS Security; and Product News
📡 TCP #65: Noma; Crowdstrike Acquisition Spree; OCSF; and Product News
📡 TCP #64: Crowdstrike v. Delta; Wiz Eyes $1B ARR; VulnHuntr; and Product News
📡 TCP #63: PANW/Splunk; CISO Split?; and Product News
📡 TCP #62: Future of SOC Tooling, NHI Index, and Snyk Product Updates
📡 TCP #61: Fal.Con; Agentic AI v. SOAR; And More
📡 TCP #60: Get out of my kernel!?
📡 TCP #59: Earnings SZN; Wiz Code and More New Products
TCP #58: Playa Mode 🏜️
TCP #57: You've Been Platformatized! 🧙🏾♂️
Return on Security
💰 Security, Funded #170 - From Zoom Doubt to AI Clout
💰 Security, Funded #169 - Pastels de Cyber
💰 Security, Funded #168 - I Vote For Cyber
💰 Security, Funded #167 - Securing the Bag
💰 Security, Funded #166 - Rates & Rising Tides
💰 Security, Funded #165 - Garbage In, Garbage Out
Cybersecurity Market Update: September 2024 Insights & Trends
The Insurance-Fueled AI Governance Wave
💰 Security, Funded #164 - Almost Own Goal
💰 Security, Funded #163 - Get the Bag
Venture in Security
5 skills and potential career paths for cybersecurity of the future
Blessed are the lawyers, for they shall inherit cybersecurity
Rick Snyder: How a Founder, VC and Governor is building a safer digital future
Tarpit startup ideas in cybersecurity: five ideas that killed many companies and will definitely kill more
Not every security leader works at a Fortune 500 company
6 tips for VCs looking to build an investment thesis in cybersecurity
10 principles for doing security and building cybersecurity products have remained unchanged since 1995
Platforms vs. best of breed is a wrong way of looking at the industry
A different take on security incident response, pitfalls of IR as a profession, and a path for advancing the field forward
Slavik Markovich: Building Descope & Demisto—brewing coffee and connections in the US-Israel tech scene
Detection at Scale
Scaling Detection Writing with LLMs
LLM Fundamentals for SecOps Teams
The Anatomy of a High Quality SIEM Rule
The CrowdStrike Fallout Continues
The Five Layers of Incident Response (Part 3)
The Evolve Bank & Trust Breach
The Hard Thing About Hard Things with Daniel Wiley
The Five Layers of Incident Response (Part 2)
The Snowflake, Live Nation, and Santander Quick Hits
SIEM 4.0: The Essentialist Evolution
Latio Pulse
Comparing Static and Runtime Reachability
How to do Vulnerability Prioritization
Why and How to Implement Seccomp Policies
What do I think about Wiz Code?
CUPS Vulnerability Response Resources
Comparing Aikido and Snyk for SCA Scanning
Vulnerability Management Part 1 - Assets and Fixes
Defining Reachability - is it just hype?
How Container Vulns Get Fixed
Shortcuts Sell
Detection Engineering Weekly
Det. Eng. Weekly #93 - Does a tangodown 3-peat count after a week off?
Det. Eng. Weekly #92 - 2 weeks, 2 tangos down
Det. Eng. Weekly #91 - #tangodown Redline & Metastealer!
Det. Eng. Weekly #90 - it's bulking szn
Det. Eng. Weekly #89 - My AWS bill is like a fleet of buses for a rally
Det. Eng. Weekly #88 - 10,000 subs!
Det. Eng. Weekly #87 - I'm downgrading the severity of the CUPS vulns
Det. Eng. Weekly #86 - Jetlagged AF
Det. Eng. Weekly #85 - Paris Vous Aime
Det. Eng. Weekly #84 - I'm baaaaaaaaack
Resilient Cyber
Resilient Cyber Newsletter #23
Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape
2024 State of the Software Supply Chain
Resilient Cyber Newsletter #22
Resilient Cyber Newsletter #21
Resilient Cyber w/ Tyler Shields and James Berthoty - Is "Shift Left" Losing its Shine?
Resilient Cyber Newsletter #20
"Shift Left" is Starting to Rust
Resilient Cyber w/ Wendy Nather & Casey Ellis - Systemic Cyber Struggles
Resilient Cyber Newsletter #19
The OSINT Newsletter
The OSINT Newsletter - Issue #58
The OSINT Newsletter - Issue #57
The OSINT Newsletter - Issue #56
The OSINT Newsletter - Issue #55
The OSINT Newsletter - Issue #54
OSINT Tool Tuesday - Telegram Phone Number Checker
The OSINT Newsletter - Issue #53
OSINT Tool Tuesday - Phunter
The OSINT Newsletter - Issue #52
OSINT Tool Tuesday - Zen
© 2024 RiskDiscovery | Sponsored by:
Deception Logic