[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
Human-in-the-loop
3 risks from AI-powered no-code tools and how to manage them to avoid data breaches and fines
SecureForge is a scam
California’s Automated-Decision System Regulation
Building trust and accelerating healthcare innovation: responsible AI at Rightway
Relentless AI Red Teaming
[Part 2] How to develop high-risk artificial intelligence systems and still comply with Colorado SB-205
[Part 1] How to deploy high-risk artificial intelligence systems and still comply with Colorado SB-205
Illinois AI Video Interview Act compliance procedure
StackAware and Accuris: secure and responsible AI for digital engineering
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
TCP #107: $15B Bitcoin Seized; Oracle 0-day; AI Girlfriend App Breached; and Product News
TCP #106: Anthropic and OpenAI Do Security; EU Cyber on Fire
TCP #105: Malware Invoking AI; JLR Gov Bailout; Vulnerable Agents; and More
TCP #104: EU Airports Disrupted; Github NPM Response; Fal.Con; and Product News
TCP #103: npm Whiplash; Sublime ADÉ; Vega $65M Series A; Wiz Incident Response and Product News
Splunk .conf 2025 Recap
TCP #102: Splunk Goes All In on Agentic AI; The NPM Supply Chain Attack That Wasn't; and Product News
TCP #101: Salesloft Breach; Cato Acquires Aim; Earnings; and Product News
TCP #100: Walmart's CISO on AI Security; Detecting Face Morphs and Product News
TCP #99: $10B run-rate; Wiz MCP; and Product News
Return on Security
💰 Security, Funded #215 - There's No Governance in this Dojo
💰 Security, Funded #214 - Lock In Season
💰 Security, Funded #213 - Firefighting vs Fire Prevention
💰 Security, Funded #212 - It's the Great Consolidation, Charlie Brown
💰 Security, Funded #211 - Two AI Models Walk Into a Bar
💰 Security, Funded #210 - Chasing the Puck
💰 Security, Funded #209 - Summer's Over, Time to Lock In
💰 Security, Funded #208 - Summer Siesta Season
💰 Security, Funded #207 - New High Score!
💰 Security, Funded #206 - Cyber Stacked the Deck
Venture in Security
Learned helplessness is hurting the security industry
To truly understand the state of the security market, we need to look beyond our industry
Three aspects of the cyber ecosystem I was wrong about not too long ago
Why your first VP of Sales hire will fail, and what you can do instead
To feel secure can be more important than to be secure
Cybersecurity has a communication problem
Three critical but rarely discussed aspects of the security market
The unbundling of Okta: are startups chipping away at Okta?
Using behavioral science to build stronger defenses
The real dilemmas of cybersecurity startup ideation, discovery, and validation
Detection at Scale
From SIEM to AI SOC: The Agent-Driven Future
D@S #67: The Crawl, Walk, Run of Agentic Security Operations with Stephen Gubenia
The Data Your AI-Powered SOC Needs
D@S #66: Databricks' Dave Herrald on Building SOCs with AI Agents & Data Lakes
D@S #65: Empowering SOC Analysts with AI and Automation
Architecting Your Detection Strategy for Speed and Context
D@S Podcast S3 Ep#63 - Why Your SOC Isn't Ready for AI (And How to Fix It)
D@S Podcast #62 - Training Analysts When AI Does the Investigating
The Cursor Moment for Security Operations
The Agentic SOC: From Isolated Automation to Orchestrated Intelligence
Latio Pulse
The 2025 Latio Cloud Security Report is Live!
Fixing the Blind Spot in Endpoint Security
LotR Episode 9: The SOC Data Breakdown
Unpacking the 2025 AI Security Acquisitions
LotR Episode 8: What is Reachability?
LotR Episode 7: Securing AI Applications
Lotr Episode 6 - What is a SOC in 2025?
LotR Episode 5 - Lessons from Shutting Down a Startup
2025 Latio AI Security Report
What is a Runtime CNAPP Anyways?
Detection Engineering Weekly
DEW #132 - Linux Rootkits Evolution, LLM Rule Evals, Oracle 0-day exploitation
DEW #131 - ❄️New EDR bypass❄️, CTI Poverty, AWS Infra Canaries & Hunting in IMDS
DEW #130 - God-mode Azure vulnerability, Composite Detections & Detection Observability
DEW #129 - Malicious browser extensions, npm gets pwned (again) and AI weaponizing CVEs
DEW #128 - AI Detection Engineering Uncertainty, 3D Threat Hunting and Salesloft Drift Shenanigans
DEW #127: SOC Visibility Triad, Feedback loops in detection, PowerShell detection ideation
Det. Eng. Weekly #126 - live laugh logs
Det. Eng. Weekly #125 - I'm the Miss Rachel of Threat Detection
Det. Eng. Weekly Issue #124 - The DEFCON hangover is real
Det. Eng. Weekly Issue #123 - Mom said I couldn't go to hacker summer camp this year
Resilient Cyber
Resilient Cyber w/ Mitch Herckis - Securing the Public Sector
Vulnerability Management Evolves to CTEM
Resilient Cyber Newsletter #68
Resilient Cyber w/ Kenny Scott - Following the Future of FedRAMP
Resilient Cyber w/ Snehal Antani - AI and Autonomous Pen Testing
Resilient Cyber Newsletter #67
SANS Difference Makers Awards!
A Security Vibe Check
Resilient Cyber w/ Alon Jackson - Enterprise Agentic Security
Resilient Cyber Newsletter #66
The OSINT Newsletter
Episode 5 – OSINT Is Growing Up
The OSINT Newsletter - Issue #81
Episode 4 – From Conflicts to Council Records: Lessons for Investigators
The OSINT Newsletter - Issue #80
Episode 3 – The Dark Side of OSINT: Influence Ops and Exploits
The OSINT Newsletter - Issue #79
Episode 2 – Scraping Smarter: AI Agents, Tattoos, & Hidden Data
The OSINT Newsletter - Issue #78
Episode 1 – OSINT in Action: From Counterterrorism to Chinese Content
The OSINT Newsletter - Issue #77
© 2025 RiskDiscovery | Sponsored by:
Deception Logic