2nd Edition

Tracking the trends and news for IT and IT Security

  • Twitter
  • SOC News

    Improve Cloud Visibility with JFrog’s SaaS Log Streamer

    Improve Cloud Visibility with JFrog’s SaaS Log Streamer>JFrog Blog – Jay Kumar, Sean PrattFrog launched a new SaaS Log Streamer beta for its cloud platform […]

    February 26, 2024

    Paul Davis

  • SOC News

    Update on the APNIC Honeynet Network | APNIC Blog

    Update on the APNIC Honeynet Network | APNIC Blog>AP NIC Blog – Adli WahidAPNIC is now operating a Community Honeynet Network (CHN) with more than […]

    February 26, 2024

    Paul Davis

  • SOC News

    The Blurred Lines Between ITOps and SecOps: Necessity or Strategy?

    The Blurred Lines Between ITOps and SecOps: Necessity or Strategy?>BNN – Wojciech ZylmThe lines between IT operations (ITOps) and security operations (SecOps) are blurring as […]

    February 26, 2024

    Paul Davis

  • SOC News

    Using Proactive Intelligence Against Adversary Infrastructure

    Using Proactive Intelligence Against Adversary Infrastructure>Security Boulevard – David RatnerOrganizations can’t prevent all breaches but can build resilience against cyberattacks using protective DNS (PDNS) and […]

    February 26, 2024

    Paul Davis

  • SOC News

    20 Critical Mistakes To Avoid After A Successful Cyberattack

    20 Critical Mistakes To Avoid After A Successful Cyberattack>Forbes – Here is a summary of the key points from the article on mistakes to avoid […]

    February 26, 2024

    Paul Davis

  • SOC News

    Applying Threat Intelligence to the Diamond Model of Intrusion Analysis

    Applying Threat Intelligence to the Diamond Model of Intrusion Analysis>Recorded Future – Cris CarreonThe Diamond Model of Intrusion Analysis is a popular cyberthreat analysis framework […]

    February 26, 2024

    Paul Davis

  • SOC News

    4 Threat Hunting Techniques to Prevent Bad Actors in 2024

    4 Threat Hunting Techniques to Prevent Bad Actors in 2024Tech Republic – Nicole RennoldsThis article emphasizes the increasing sophistication of cybersecurity threats, such as no-code […]

    February 26, 2024

    Paul Davis

  • SOC News

    Overcoming cybersecurity automation challenges – Data Centre Review

    Overcoming cybersecurity automation challenges – Data Centre ReviewData Centre Review – While there is enthusiasm and budget for cybersecurity automation, organizations struggle to achieve anticipated […]

    February 26, 2024

    Paul Davis

  • SOC News

    How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited

    How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited>Dark Reading – Ken DunhamData vulnerabilities and cyberattacks are increasing, prompting new SEC rules requiring public […]

    February 26, 2024

    Paul Davis

  • SOC News

    *nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 2 of 2

    *nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 2 of 2>JFrog Blog – Yair MizrahiJFrog discovered two vulnerabilities in the popular X.Org libX11 […]

    February 26, 2024

    Paul Davis

←Newer Posts Older Posts→

Categories


  • AI / ML
  • AIOps
  • IT/OT News
  • Open Source
  • Security Industry News
  • Security Strategy News
  • SOC News
  • Zero Trust

Recent Posts


  • Cybersecurity Threat Landscape and 2026 OutlookJanuary 11, 2026
  • Cyber Resilience and Software EscrowJanuary 11, 2026
  • AI & Humans: Making the Relationship Work – Schneier on SecurityJanuary 11, 2026
  • How AI is Streamlining the Underwriting Process for the Insurance IndustryJanuary 11, 2026

Tags


2nd Edition

Boston, USA

Pages

Links

F.A.Q.

Terms and Conditions

Support

Social

Twitter