[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
What High-risk AI deployers can ask their vendors to help with Colorado SB-205 compliance
How Deployers can comply with the EU AI Act (even when using High-risk Artificial Intelligence Systems)
Rethinking AI Agent Design
A 3-level framework for business leaders to manage AI-driven bias
SOC 2 is dead
ISO/IEC 42001 Readiness at Rightway
Non-human identities
8 ways to sell AI to enterprises while securely training on their data
StackAware partners with SplxAI to strengthen AI security and compliance
Driving secure and compliant AI-powered digital transformation at Accuris
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
TCP #88: Security is spicy
TCP #87: Orca Acquires Opus; Earnings SZN; and Product News
TCP #86: Top Startups, Events, Swag, and Booths at RSAC 2025
TCP #85: RSAC Recap, Part I
TCP #84: Pre-RSA Roundup; Verizon DBIR; and Self-Driving SIEMs
TCP #83: CVE whiplash; 4chan breached; and road to RSAC
TCP #82: Agent-to-Agent Dance
Wiz’s $32B Sales Engine: From Founder-Led to Channel-Led Growth (Part II)
2025 RSAC Innovation Sandbox Finalists Announced
TCP #81: The Calm Before the Storm
Return on Security
💰 Security, Funded #194 - Did AI Just Free Willy?
💰 Security, Funded #193 - From RSA to ROI
💰 Security, Funded #192 - Markets Don't Do Conference Breaks
💰 Security, Funded #191 - RSA State of Mind
💰 Security, Funded #190 - Sparkling Risk Management
💰 Security, Funded #189 - Cool Quantum Croissants
Saturday Special - The Uncertainty Era
💰 Security, Funded #188 - When Tariffs Hit the Fan
Return on Security OG Supporters
Vibe PMF and the Hidden Economics of Founder Conversations
Venture in Security
IKEA effect in cybersecurity or why we love the things we build
A perfect cybersecurity startup idea
How startups work: a field guide for security people
The ultimate guide to publishing a best selling cybersecurity book
Dug Song: Values over valuation—reflections on building Duo Security and leading with purpose
GRC Market Evolution: How the automation vendors redefined the competitive landscape
Get ready for Wiz mafia to forever reshape the future of cybersecurity
Tensions and opportunities for cybersecurity founders: considerations when building a security company
Navigating the cybersecurity industry: founder’s guide
Today’s AI-powered SOC companies are tomorrow’s security service providers
Detection at Scale
Securing MCP: 5 Safeguards for Enterprise Teams
How AI Agents Transform Alert Triage
MCP: Building Your SecOps AI Ecosystem
The AI-Powered Detection Engineer
Teaching Security AI Agents to Navigate Your Organization
D@S #56: Building Security for Rabbit's AI-powered Hardware
Investigative AI Agents: Saving Time during Triage and Analysis
The New Economics of an AI-Powered SIEM
D@S #55: Salesforce’s Mor Levi on AI Agents in SecOps
From Logs to Context: Evolving SIEM with Asset Intelligence
Latio Pulse
LotR Episode 3 - Digging into eBPF for Security
RSAC 2025 Thoughts and Takeaways
Everything to Know about Runtime Reachability
Runtime Cloud Security in 2025
LotR - Episode 2: tj-actions and the Supply Chain Scaries
What is Code to Cloud, and Does it Matter?
Latio: On the Record, Episode 1
Wiz Acquisition - Winners, Losers, and the Multi-Cloud...Future?
Supply Chain Security is FUBAR - A Proposal for GitHub
Understanding and Re-Creating the tj-actions/changed-files Supply Chain Attack
Detection Engineering Weekly
Det. Eng. Weekly #113 - Can I get a rule, and can you make it last forever?
Det. Eng. Weekly #112 - ]ffcvbhvvji90
Det. Eng. Weekly #111 - I'll take 1 trade show with a side of cyber vandalism
Det. Eng. Weekly #110 - I travel to 🇫🇷 and SmokeLoader gets taken down?
Det. Eng. Weekly #109 - I’m making a Hinge for detection engineers
Det. Eng. Weekly #108 - Can any1 in the IC add me to their Signal group?
The Security Research Product Function
Det. Eng. Weekly #107 - Youu arrrre a cinemaaa
Det. Eng. Weekly #106 - Have you said thank you once..
Det. Eng. Weekly #105 - I'm assembling a team
Resilient Cyber
Resilient Cyber Newsletter #48
Resilient Cyber w/ Vineeth Sai Narajala: Model Context Protocol (MCP) - Potential & Pitfalls
Quantifying AI's Impact on Data Risk
Resilient Cyber w/ Jay Jacobs & Michael Roytman - VulnMgt Modernization & Localized Modeling
Resilient Cyber Newsletter #47
Orchestrating Agentic AI Securely
Resilient Cyber w/ Andy Cao - Vulnerability Management Modernization & Open Source Innovation
Resilient Cyber Newsletter #46
Buckle Up For the DoD's Software Fast Track ATO (SWFT)
Vulnerability Velocity & Exploitation Enigma's
The OSINT Newsletter
The OSINT Newsletter - Issue #71
The OSINT Newsletter - Issue #70
The OSINT Newsletter - Issue #69
The OSINT Newsletter - Issue #68
The OSINT Newsletter - Issue #67
The OSINT Newsletter - Issue #66
The OSINT Newsletter - Issue #65
The OSINT Newsletter - Issue #64
The OSINT Newsletter - Issue #63
The OSINT Newsletter - Issue #62
© 2024 RiskDiscovery | Sponsored by:
Deception Logic