[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
A 3-level framework for business leaders to manage AI-driven bias
SOC 2 is dead
ISO/IEC 42001 Readiness at Rightway
Non-human identities
8 ways to sell AI to enterprises while securely training on their data
StackAware partners with SplxAI to strengthen AI security and compliance
Driving secure and compliant AI-powered digital transformation at Accuris
DeepSeek security and privacy analysis
The complete guide to AI transparency, explainability, and interpretability
Expanding AI governance and security at Eleos
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
TCP #80: Chainguard Assemble, 23AndMeAndYou?, IngressNightmare, and More
Wiz’s $32B GTM Playbook: Unpacking the Formula (Part I)
TCP #79: Is Vega the next Wiz? And When Vibe Coding Goes Wrong
TCP #78: The Future of Security🔮
TCP #77: CISO Lens, Q4 Earnings, and More!
⚡ TCP #76: $1.5B ByBit Hack; Series A Palooza; and Product News
⚡ TCP #75: State of Detection Engineering; NSO Money; and Product News
⚡ TCP #74: Security Buyer Psychology, 7AI, Wiz, Earnings SZN, and Product News
⚡ TCP #73: DARPA Red-C; SailPoint IPO; Palantir Security; and Product News
⚡ TCP #72: Humanless SOCs; DeepSeek; Opengrep; and Product News
Return on Security
Support Return on Security | Back Cyber Market Intelligence
💰 Security, Funded #186 - GWiz II (This Time it's Personal)
Understanding Digital Footprint Management
💰 Security, Funded #185 - Panic at the Boardroom
💰 Security, Funded #184 - Zero Trust for AI
💰 Security, Funded #183 - The Shutdown Blues
💰 Security, Funded #182 - Let's Get Physical
💰 Security, Funded #181 - Billion Dollar Baby, Don't At Me
Never Waste a Good Compliance Framework
💰 Security, Funded #180 - Mustard on the [Q4 Earnings] Beat
Venture in Security
Tensions and opportunities for cybersecurity founders: considerations when building a security company
Navigating the cybersecurity industry: founder’s guide
Today’s AI-powered SOC companies are tomorrow’s security service providers
Today’s AI-powered SOC companies are tomorrow’s security service providers
Jeetu Patel: Cisco’s AI-powered cybersecurity future
“Why now?”: a single question that decides what security startups succeed, and which fail
How pentesting mirrors the evolution of quality assurance
Structuring founding teams to win in security: a data-driven look
Shlomo Kramer: A playbook for building three multi billion-dollar cybersecurity companies - Cato Networks, Check Point, and Imperva
Will the next wave of cybersecurity success stories originate in open source?
Detection at Scale
The AI-Powered Detection Engineer
Teaching Security AI Agents to Navigate Your Organization
D@S #56: Building Security for Rabbit's AI-powered Hardware
Investigative AI Agents: Saving Time during Triage and Analysis
The New Economics of an AI-Powered SIEM
D@S #55: Salesforce’s Mor Levi on AI Agents in SecOps
From Logs to Context: Evolving SIEM with Asset Intelligence
Agents of Change: Building Collective SIEM Intelligence
The Evolved SOC Analyst
The Agentic SIEM
Latio Pulse
What is Code to Cloud, and Does it Matter?
Latio: On the Record, Episode 1
Wiz Acquisition - Winners, Losers, and the Multi-Cloud...Future?
Supply Chain Security is FUBAR - A Proposal for GitHub
Understanding and Re-Creating the tj-actions/changed-files Supply Chain Attack
The Great CNAPP Re-bundle
Introducing Latio's Actually Useful Product Guide's - AI AppSec Engineers
Announcing OpenGrep
Wiz Defend-ing Their Flank
Comparing Static and Runtime Reachability
Detection Engineering Weekly
The Security Research Product Function
Det. Eng. Weekly #107 - Youu arrrre a cinemaaa
Det. Eng. Weekly #106 - Have you said thank you once..
Det. Eng. Weekly #105 - I'm assembling a team
Det. Eng. Weekly #104 - I need you to email me your top 5..
Det. Eng. Weekly #103 - Chiefs Lose, America Wins
Det. Eng. Weekly #102 - Explain the Doncic/Davis trade in security terms
Det. Eng. Weekly #101 - 01001000 01101001
Det. Eng. Weekly #100 - Keepin' it 💯
Det. Eng. Weekly #99 - I got 99 problems
Resilient Cyber
Resilient Cyber w/ Elad Schulman - Secure Enterprise LLM/GenAI Adoption
Context is King but Prioritization is Priceless
Resilient Cyber w/ Piyush Sharrma - AI-Powered Defense & Security Mesh
Resilient Cyber Newsletter #40
Vibe Coding Conundrums
Resilient Cyber w/ Sergej Epp - Cloud-native Runtime Security & Usage
Resilient Cyber Newsletter #39
Resilient Cyber's Collection of AI Security Resources
Diving into ReversingLabs' 2025 Software Supply Chain Security (SSCS) Report
Resilient Cyber w/ Chenxi Wang - The Intersection of AI & Cybersecurity
The OSINT Newsletter
The OSINT Newsletter - Issue #67
The OSINT Newsletter - Issue #66
The OSINT Newsletter - Issue #65
The OSINT Newsletter - Issue #64
The OSINT Newsletter - Issue #63
The OSINT Newsletter - Issue #62
The OSINT Newsletter - Issue #61
The OSINT Newsletter - Issue #60
The OSINT Newsletter - Issue #59
The OSINT Newsletter - Issue #58
© 2024 RiskDiscovery | Sponsored by:
Deception Logic