[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cyber Why
Crowdstrike Update Causes Blue Screen of Death
The Cyber Why: What We Read This Week...
"DR" Word Soup: A Long and Winding Road
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
The Cyber Why: What We Read This Week...
Cyber arrests, Death of SIEM, MS Total Recall, Getting Snowflaked, and the Gili Ra'anan Model - TCW EP4
The Cyber Why: What We Read This Week...
Fortinet Acquires Lacework in Surprising Move
Can You Land Your Next Job Without Your Network?
Deploy Securely
Fight fear, uncertainty, and doubt about AI data security
5 ways AI governance can boost sales, avoid fines, and keep your edge
AI governance and customer due diligence
3 AI governance frameworks business leaders can use to accelerate sales and avoid regulatory fines
Almost 30% of enterprises deploying AI had an AI security breach, according to Gartner
Accelerating AI governance at Embold Health
Figma AI: security and privacy considerations
3 ways to evaluate open source AI model security
StackAware and TJC: secure and responsible AI for private equity
The top 3 data security concerns blocking AI adoption in healthcare (and how to mitigate them)
Omer on Security
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Laceworkβs AI Didnβt Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
Stop Playing MITRE ATT&CK Bingo
Behavior Analytics in Your Security Data Lake Just Got Way Easier
The Cybersecurity Pulse
TCP #54: Cyberstarts Seeds Linx, CRWD x MSFT Kerfuffle and Product News
Global IT Outage Caused By Crowdstrike Falcon EDR Updates
TCP #53: Wiz Readying for IPO? and Product News
TCP #52: Mainframe Security, Data Lineage, and More Product News!
TCP 51: Slow Week for Product Innovation Which Means...
TCP #50: AWS re:Inforce, Splunk .conf24, and more product news!
TCP #49: Recall Dumpster Fire
TCP #48: But Can Your Product Predict Attacks?
TCP #47: Don't AI My Firewall π¨π½βπ
TCP #46: Product News and Finally, SIEM Consolidation
Return on Security
π° Security, Funded #153 - You've Been CrowdStruck
Cybersecurity Market Update: June 2024 Insights & Trends
π° Security, Funded #152 - We Just Might Be So Back
π° Security, Funded #151 - From Spain with Vermouth
The Global AI Arms Race: The Cat-and-Mouse Game of Tech Dominance
π° Security, Funded #150 - Triple The Fun(d)
π° Security, Funded #149 - Economic Shifts & Cyber Drifts
Cybersecurity Market Update: May 2024 Insights & Trends
π° Security, Funded #148 - Do Red Teams Dream of Electronic Sheep?
The Revolution of Mobile Device Security: Navigating Threats and Solutions
Venture in Security
Every successful security platform started as a point solution
Palo Alto isnβt going to buy everyone: the anatomy of cybersecurity startup exits
Marty Roesch: Scaling Sourcefire and creating a new way to monetize open source security software
Blessed are the software engineers, for they shall inherit cybersecurity
Cybersecurity technology adoption cycle and its implications for startups and security teams
I am now based in San Francisco - excited to become a part of the local community
To become a better cybersecurity startup founder, you need to master writing
Hiring top performers from large cybersecurity vendors won't help early-stage startups grow, but it can ruin them
Cybersecurity is not a market for lemons. It is a market for silver bullets.
Ron Gula: Bootstrapping Tenable to $100M revenue and becoming an influencer
Detection at Scale
The Five Layers of Incident Response (Part 3)
The Evolve Bank & Trust Breach
The Hard Thing About Hard Things with Daniel Wiley
The Five Layers of Incident Response (Part 2)
The Snowflake, Live Nation, and Santander Quick Hits
SIEM 4.0: The Essentialist Evolution
The Five Layers of Incident Response (Part 1)
The GenAI D&R Revolution Begins
The Podcast Quick Hits with Josh Liburdi at Brex
Correlating AWS S3 Breaches
Latio Pulse
WTF is Cloud Application Detection Response (CADR)?
The Kubernetes Gap in CNAPP
CVE-2024-6387 Response Resources - "regreSSHion"
Understanding the Polyfill Attack (Polykill)
WTF is Application Detection and Response (ADR)?
WTF is Cloud Detection and Response (CDR)?
5 Steps for Creating an AppSec Program
5 Security Blindspots
What Tool Best Compliments CNAPP?
ADR - The Future of Runtime
Detection Engineering Weekly
Det. Eng. Weekly #78 - π Begone, grifters! π
Det. Eng. Weekly #77 - Seventy times 7
Det. Eng. Weekly #76 - My dog ate my newsletter
Det. Eng. Weekly #75 - πΊ I'm looking for a Vuln on a Monday π
Det. Eng. Weekly #74 - Happy Birthday, Pasha!
Det. Eng. Weekly #73 - If BreachForums goes down, do intel firms have a product?
Det. Eng. Weekly #72 - Chasing an π in a π€‘ π
Det. Eng. Weekly #71 - AI next-gen cloud-based detection data ocean
Det. Eng. Weekly #70 - It's hot detection summer
Det. Eng. Weekly #69 - RSA ninjas stole my badge and swag
Resilient Cyber
Resilient Cyber w/ Travis McPeak - Securing Cloud-native Infrastructure
3 Key Areas for Mitigating Non-Human Identity (NHI) Risks
Resilient Cyber Newsletter #6
Resilient Cyber w/ Stuart Mitchell - Cyber Talent, Recruiting & the Workforce
Resilient Cyber Newsletter #5
Resilient Cyber Newsletter #4
S6E22: Daniel Shechter - Application Detect & Response (ADR)
Resilient Cyber Newsletter #3
Resilient Cyber Newsletter #2
Resilient Cyber Newsletter #1
The OSINT Newsletter
The OSINT Newsletter - Issue #58
The OSINT Newsletter - Issue #57
The OSINT Newsletter - Issue #56
The OSINT Newsletter - Issue #55
The OSINT Newsletter - Issue #54
OSINT Tool Tuesday - Telegram Phone Number Checker
The OSINT Newsletter - Issue #53
OSINT Tool Tuesday - Phunter
The OSINT Newsletter - Issue #52
OSINT Tool Tuesday - Zen
© 2024 RiskDiscovery | Sponsored by:
Deception Logic