[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
Driving ISO 42001 certification in AI-powered healthcare with Eleos
Human-in-the-loop
3 risks from AI-powered no-code tools and how to manage them to avoid data breaches and fines
SecureForge is a scam
California’s Automated-Decision System Regulation
Building trust and accelerating healthcare innovation: responsible AI at Rightway
Relentless AI Red Teaming
[Part 2] How to develop high-risk artificial intelligence systems and still comply with Colorado SB-205
[Part 1] How to deploy high-risk artificial intelligence systems and still comply with Colorado SB-205
Illinois AI Video Interview Act compliance procedure
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
TCP #111: Shai-hulud is back; Data Lakes and AI SOCs; and More
TCP #110: 2026 CISO Budgets; Cloudflare Outage; AWS re:Invent; and More
TCP #109: Insecure AI Browsers; Prisma AIRS 2.0; Fundraise Galore; and More
TCP #108: F5 BIG-IP + AWS Woes; Scaling 1 Million K8s Nodes; and Product News
TCP #107: $15B Bitcoin Seized; Oracle 0-day; AI Girlfriend App Breached; and Product News
TCP #106: Anthropic and OpenAI Do Security; EU Cyber on Fire
TCP #105: Malware Invoking AI; JLR Gov Bailout; Vulnerable Agents; and More
TCP #104: EU Airports Disrupted; Github NPM Response; Fal.Con; and Product News
TCP #103: npm Whiplash; Sublime ADÉ; Vega $65M Series A; Wiz Incident Response and Product News
Splunk .conf 2025 Recap
Return on Security
💰 Security, Funded #221 - Let Nikesh Cook
💰 Security, Funded #220 - When AI Investment Turns People Divestment
💰 Security, Funded #219 - Thirty-Two Billion Reasons
The AI Security Absorption Has Begun
💰 Security, Funded #218 - Earnings [Season] Has Entered the Chat
💰 Security, Funded #217 - Running [Smart Beds] On-Prem
💰 Security, Funded #216 - Straight Outta [Cheltenham]
💰 Security, Funded #215 - There's No Governance in this Dojo
💰 Security, Funded #214 - Lock In Season
💰 Security, Funded #213 - Firefighting vs Fire Prevention
Venture in Security
Most cyber companies simply can’t scale as fast as the new AI startups
Nobody ever gets credit for fixing security problems that never happened
Not getting incentives right can kill a security initiative or a security startup
Behind every successful security company is a software engineer you’ve never heard of
AI doesn’t make it much easier to build security startups
Redefining “critical infrastructure” for the modern age
Learned helplessness is hurting the security industry
To truly understand the state of the security market, we need to look beyond our industry
Three aspects of the cyber ecosystem I was wrong about not too long ago
Why your first VP of Sales hire will fail, and what you can do instead
Detection at Scale
D@S #70 - GreenSky's Ken Bowles on Protecting Crown Jewels First and AI's Real Role in the SOC
D@S #69 - FanDuel's All-Engineer SOC: From Phishing to IR with Custom Agents
Building Custom AI SOC Agents with MCP
How AI Agent Tools Work: A Practical Guide for SOC Analysts
D@S #68 - Building Production-Ready AI Agents in Security Operations
From SIEM to AI SOC: The Agent-Driven Future
D@S #67: The Crawl, Walk, Run of Agentic Security Operations with Stephen Gubenia
The Data Your AI-Powered SOC Needs
D@S #66: Databricks' Dave Herrald on Building SOCs with AI Agents & Data Lakes
D@S #65: Empowering SOC Analysts with AI and Automation
Latio Pulse
Unpacking Wizdom and GitHub Universe 2025
The 2025 Latio Cloud Security Report is Live!
Fixing the Blind Spot in Endpoint Security
LotR Episode 9: The SOC Data Breakdown
Unpacking the 2025 AI Security Acquisitions
LotR Episode 8: What is Reachability?
LotR Episode 7: Securing AI Applications
Lotr Episode 6 - What is a SOC in 2025?
LotR Episode 5 - Lessons from Shutting Down a Startup
2025 Latio AI Security Report
Detection Engineering Weekly
DEW #138 - Sigma's Detection Quality Pipeline, Anthropic finds AI-first APT & eBPF shenanigans
DEW #137 - AI Agents For Security By Security, Free Sigma training & JA4 for beginners
DEW #136 - ATT&CK V18 deep dive, Cyberslop @ MIT & Aisuru repurposes to residential proxies
DEW #135 - Chaos Detection Engineering, Connecting Policy to IR playbooks & Spooky AWS Policies
DEW #134 - Prioritizing Critical Assets, AI SOC means MORE alerts and Microsoft CoPilot Phishing
DEW #133 - Redefining Security Visibility, TTP-First Hunting & F5 breach
DEW #132 - Linux Rootkits Evolution, LLM Rule Evals, Oracle 0-day exploitation
DEW #131 - ❄️New EDR bypass❄️, CTI Poverty, AWS Infra Canaries & Hunting in IMDS
DEW #130 - God-mode Azure vulnerability, Composite Detections & Detection Observability
DEW #129 - Malicious browser extensions, npm gets pwned (again) and AI weaponizing CVEs
Resilient Cyber
Innovating Cybersecurity Investigations
State of AI in SecOps - 2025
Resilient Cyber w/ Kayne McGladrey - From Assessment to Action
Resilient Cyber Newsletter #74
The Security Challenges of Post-Quantum Aren't As Far Off As You Think
Exposure Management Metrics
Resilient Cyber w/ Henrik & Amod - 2025 State of Dependency Management
Resilient Cyber Newsletter #73
The Evolution of AppSec - From Shifting Left to Rallying on Runtime
Resilient Cyber w/ Kamal Shah - The State of AI in SecOps
The OSINT Newsletter
Black Friday: 60% Off The OSINT Newsletter Annual Subscription. For 10 days only 🏃🛒💸
Episode 8 - Email OSINT, Data Leaks, and Why Meta Is Watching Your Prompts
The OSINT Newsletter - Issue #87
The OSINT Newsletter - Issue #86
Episode 7 - Usernames, Pivots, and AI in OSINT
The OSINT Newsletter - Issue #85
The OSINT Newsletter - Issue #84
Episode 6 – The Spectrum of OSINT
The OSINT Newsletter - Issue #83
The OSINT Newsletter - Issue #82
© 2025 RiskDiscovery | Sponsored by:
Deception Logic