[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
The Cyber Why: What We Read This Week...
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
Deploy Securely
Relentless AI Red Teaming
[Part 2] How to develop high-risk artificial intelligence systems and still comply with Colorado SB-205
[Part 1] How to deploy high-risk artificial intelligence systems and still comply with Colorado SB-205
Illinois AI Video Interview Act compliance procedure
StackAware and Accuris: secure and responsible AI for digital engineering
How to comply with New York City Local Law 144 on Automated Employment Decision Tools
How LastPass Fortified AI Governance and Security with StackAware
How effective AI governance can improve cyber insurance coverage
Model Context Protocol (MCP)
What High-risk AI deployers can ask their vendors to help with Colorado SB-205 compliance
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
The Cybersecurity Pulse
TCP #98: AIxCC; GPT-5 Security Woes; and Hacker Summer Camp News
TCP #97: 5 Takeaways From Black Hat x DEF CON 2025
📊 Dissecting IBM's 2025 Cost of a Data Breach Report
TCP #96: PANW To Acquire CyberArk for $25B; Cost of Breach $10.22M; the TEA breach; and Tons of Pre-Hacker Summer Camp News
The Future of Data Security: From AI Agents to Unified Platforms
TCP #95: SharePoint Hell; M&A Rumor Mill; Scattered Spider; & Product News
TCP #94: GPUHammer; MITRE AADAPT; MCP Security Woes; and Product News
TCP #93: EU AI Act in Peril; SecOps HypeCycle; fwd:cloudsec talks; and Product News
TCP #92: Software 3.0; SIEM v. XDR; Scattered Spider; and Product News
TCP #91: When Everything Decides to Break at Once
Return on Security
💰 Security, Funded #207 - New High Score!
💰 Security, Funded #206 - Cyber Stacked the Deck
💰 Security, Funded #205 - Back in Black(jack)
💰 Security, Funded #204 - All Gas No Brakes
💰 Security, Funded #203 - Porto Folio Management
💰 Security, Funded #202 - The Calm Between Storms
💰 Security, Funded #201 - Flip it and Reverse It
💰 Security, Funded #200 - Double Benjamin Energy
The Foolproof Guide to Building a Miserable Security Program
💰 Security, Funded #199 - The Model Weights Are Off
Venture in Security
PAM is not dead, it’s evolving
To solve security problems, you don’t have to build a security company
20 years of cybersecurity consolidation: how 200 companies became 11
Cyber favors seconds: second movers, second-time founders, and second opinions
In security, not every industry problem is a business problem
Cybersecurity is changing how financial markets work but not in the way people think
You don’t start a platform, you earn the right to become one
10 immutable laws of security, 25 years later
AppSec/ProdSec's reality gap: why theory doesn't match practice
Joe Levy: Scaling Sophos to $1B+ revenue and defending the 350M overlooked businesses
Detection at Scale
Architecting Your Detection Strategy for Speed and Context
D@S Podcast S3 Ep#63 - Why Your SOC Isn't Ready for AI (And How to Fix It)
D@S Podcast #62 - Training Analysts When AI Does the Investigating
The Cursor Moment for Security Operations
The Agentic SOC: From Isolated Automation to Orchestrated Intelligence
Securing MCP: 5 Safeguards for Enterprise Teams
How AI Agents Transform Alert Triage
MCP: Building Your SecOps AI Ecosystem
The AI-Powered Detection Engineer
Teaching Security AI Agents to Navigate Your Organization
Latio Pulse
LotR Episode 8: What is Reachability?
LotR Episode 7: Securing AI Applications
Lotr Episode 6 - What is a SOC in 2025?
LotR Episode 5 - Lessons from Shutting Down a Startup
2025 Latio AI Security Report
What is a Runtime CNAPP Anyways?
Latio on the Record Episode 4 - What's the Deal with Hardened Containers
LotR Episode 3 - Digging into eBPF for Security
RSAC 2025 Thoughts and Takeaways
Everything to Know about Runtime Reachability
Detection Engineering Weekly
Det. Eng. Weekly #125 - I'm the Miss Rachel of Threat Detection
Det. Eng. Weekly Issue #124 - The DEFCON hangover is real
Det. Eng. Weekly Issue #123 - Mom said I couldn't go to hacker summer camp this year
Det. Eng. Weekly #122 - I stare at alerts like an iPad kid
Det. Eng. Weekly #121 - lol sharepoint
Detection Field Manual #3 - What is detection rule efficacy?
Det. Eng. Weekly #120 - Gems from the 2025 Trenches, Part 2
Det. Eng. Weekly #119 - Gems from the 2025 Trenches, Part 1
Detection Field Manual #2 - What are Detection Rules?
Det. Eng. Weekly #118 - If a threat cluster falls in the woods and no one is there to hear it..
Resilient Cyber
Resilient Cyber Newsletter #60
OPERATION FROSTBYTE - Snowflake GOAT
Resilient Cyber Newsletter #59
AI Adoption: Seatbelts, Air Bags & Oversight Optional
Resilient Cyber w/ Sid Trivedi - Black Hat, Cyber and AI Opportunities
Fast and Flawed
Resilient Cyber Newsletter #58
AI - Incentives, Economics, Technology and National Security
Resilient Cyber w/ Christian Posta MCP, Agents & IAM in the age of LLMs
Resilient Cyber #57
The OSINT Newsletter
Episode 1 – OSINT in Action: From Counterterrorism to Chinese Content
The OSINT Newsletter - Issue #77
The OSINT Podcast is back! (Trailer)
The OSINT Newsletter - Issue #76
The OSINT Newsletter - Issue #75
The OSINT Newsletter - Issue #74
The OSINT Newsletter - Issue #73
The OSINT Newsletter - Issue #72
The OSINT Newsletter - Issue #71
The OSINT Newsletter - Issue #70
© 2025 RiskDiscovery | Sponsored by:
Deception Logic