[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
3 ways ISO 42001 can help AI-powered companies comply with California's training data transparency bill (AB-2013)
Yes, you are using AI
3 business reasons I am staying opted-in to LinkedIn's generative AI training
StackAware and Schellman: preparing and certifying AI-powered companies for ISO 42001
Will ISO 42001 certification disrupt AI product development by distracting my engineers?
Navigate Obamacare nondiscrimination regulations for healthcare AI customers with ISO 42001
Seven ISO 42001 Annex A controls you might be able to exclude
Securing AI-powered behavioral health documentation at Eleos
A 3-level framework for security leaders to assess -aaS GenAI security
How AI-powered companies can implement ISO 42001 control A.8.4 to rebuild trust after an incident
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
📡 TCP #62: Future of SOC Tooling, NHI Index, and Snyk Product Updates
📡 TCP #61: Fal.Con; Agentic AI v. SOAR; And More
📡 TCP #60: Get out of my kernel!?
📡 TCP #59: Earnings SZN; Wiz Code and More New Products
TCP #58: Playa Mode 🏜️
TCP #57: You've Been Platformatized! 🧙🏾♂️
TCP #56: BlackHat Product Recap
BlackHat Innovators & Investors Quick Hits
BlackHat Startup Spotlight 2024 Finalists: An Inside Look
TCP #55: Mo Money, Mo NHI Startups
Return on Security
💰 Security, Funded #165 - Garbage In, Garbage Out
The Insurance-Fueled AI Governance Wave
💰 Security, Funded #164 - Almost Own Goal
💰 Security, Funded #163 - Get the Bag
300 Billion Emails, Infinite Risk: The Evolution of Email Security
💰 Security, Funded #162 - Surfing Economic Waves
💰 Security, Funded #161 - A is for Series Awesome
Cybersecurity Market Update: August 2024 Insights & Trends
💰 Security, Funded #160 - Soft(ish) Landing
💰 Security, Funded #159 - Summertime Sadness
Venture in Security
Platforms vs. best of breed is a wrong way of looking at the industry
A different take on security incident response, pitfalls of IR as a profession, and a path for advancing the field forward
Slavik Markovich: Building Descope & Demisto—brewing coffee and connections in the US-Israel tech scene
There are no magic bullets, and every purchasing decision in security comes with trade-offs
Security awareness won’t save us, and people will continue clicking on links (as they should)
Support my work - help 'Cyber for Builders' win the most prestigious award in the industry
Inverted crossing the chasm problem in cybersecurity: what founders and investors need to keep in mind
Splunk, Okta, Cylance, Palo Alto, CrowdStrike, and Zscaler mafias in cybersecurity
Lifting the world out of the cybersecurity poverty
Doug Merritt: Creating a decacorn in Splunk and identifying trends
Detection at Scale
Scaling Detection Writing with LLMs
LLM Fundamentals for SecOps Teams
The Anatomy of a High Quality SIEM Rule
The CrowdStrike Fallout Continues
The Five Layers of Incident Response (Part 3)
The Evolve Bank & Trust Breach
The Hard Thing About Hard Things with Daniel Wiley
The Five Layers of Incident Response (Part 2)
The Snowflake, Live Nation, and Santander Quick Hits
SIEM 4.0: The Essentialist Evolution
Latio Pulse
How to do Vulnerability Prioritization
Why and How to Implement Seccomp Policies
What do I think about Wiz Code?
CUPS Vulnerability Response Resources
Comparing Aikido and Snyk for SCA Scanning
Vulnerability Management Part 1 - Assets and Fixes
Defining Reachability - is it just hype?
How Container Vulns Get Fixed
Shortcuts Sell
WTF is Cloud Application Detection Response (CADR)?
Detection Engineering Weekly
Det. Eng. Weekly #89 - My AWS bill is like a fleet of buses for a rally
Det. Eng. Weekly #88 - 10,000 subs!
Det. Eng. Weekly #87 - I'm downgrading the severity of the CUPS vulns
Det. Eng. Weekly #86 - Jetlagged AF
Det. Eng. Weekly #85 - Paris Vous Aime
Det. Eng. Weekly #84 - I'm baaaaaaaaack
Det. Eng. Weekly #83 - My alert queue: very demure, very mindful
Det. Eng. Weekly #82 - Catchy title with pop culture/security reference
Det. Eng. Weekly #81 - My dog DDoSed my Twitter space
Det. Eng. Weekly #80 - Hacker Summer Camp FOMO
Resilient Cyber
Resilient Cyber w/ Mark Simos - Cybersecurity Anti-Patterns
Resilient Cyber Newsletter #18
State of Dependency Management - 2024
Resilient Cyber Newsletter #17
Secure-by-Design vs. Secure-by-Default: What's the Difference?
Resilient Cyber w/ Helen Oakley - Exploring the AI Supply Chain
Resilient Cyber Newsletter #15
Resilient Cyber Newsletter #14
Cybersecurity Workforce Woes
Resilient Cyber w/ Ross Young - How to Become a CISO
The OSINT Newsletter
The OSINT Newsletter - Issue #58
The OSINT Newsletter - Issue #57
The OSINT Newsletter - Issue #56
The OSINT Newsletter - Issue #55
The OSINT Newsletter - Issue #54
OSINT Tool Tuesday - Telegram Phone Number Checker
The OSINT Newsletter - Issue #53
OSINT Tool Tuesday - Phunter
The OSINT Newsletter - Issue #52
OSINT Tool Tuesday - Zen
© 2024 RiskDiscovery | Sponsored by:
Deception Logic