2nd Edition

Tracking the trends and news for IT and IT Security

  • Twitter
  • SOC News

    Threat Modeling Tools Market Set to Surpass USD 2.4 Billion by 2030 Driven by Advanced Security …

    Threat Modeling Tools Market Set to Surpass USD 2.4 Billion by 2030 Driven by Advanced Security …>EIN Presswire – Agile Defense, an end-to-end provider of […]

    February 26, 2024

    Paul Davis

  • SOC News

    Nearly half (44%) of Financial Services organisations grapple with underperforming cyber securit…

    Nearly half (44%) of Financial Services organisations grapple with underperforming cyber securit…>Global Security Mag – e2e-assureA new report by e2e-assure reveals that almost half (44%) […]

    February 26, 2024

    Paul Davis

  • SOC News

    How Capture the Flag Raises Security Awareness and Enhances Enforcement

    How Capture the Flag Raises Security Awareness and Enhances Enforcement>JFrog Blog – The Capture the Flag (CTF) competition has become an innovative method to raise […]

    February 26, 2024

    Paul Davis

  • SOC News

    Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

    Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub>The Hacker News – Two malicious npm packages, warbeast2000 and kodiak2k, were found to exploit […]

    February 26, 2024

    Paul Davis

  • SOC News

    When is a critical vulnerability actually dangerous?

    When is a critical vulnerability actually dangerous?>Techzine – Erik van KlinkenNew vulnerabilities emerge daily with varying CVE scores, which can be misleading as they do […]

    February 26, 2024

    Paul Davis

  • SOC News

    10 OSINT Tools We Use in Our SOC

    10 OSINT Tools We Use in Our SOCMedium – Fazle RabbiThe document extensively discusses the significance of Open Source Intelligence (OSINT) in the modern digital […]

    February 26, 2024

    Paul Davis

  • SOC News

    Evolving Your SIEM Detection Rules: A Journey from Simple to Sophisticated

    Evolving Your SIEM Detection Rules: A Journey from Simple to Sophisticated>Databricks Blog – The blog post discusses the evolution of SIEM detection capabilities from basic […]

    February 26, 2024

    Paul Davis

  • SOC News

    Cisco Patches Critical Vulnerability in Enterprise Collaboration Products

    Cisco Patches Critical Vulnerability in Enterprise Collaboration ProductsSecurity Week – Ionut ArghireSummarize this: “Cisco on Wednesday announced patches for a critical-severity vulnerability in multiple Unified […]

    February 26, 2024

    Paul Davis

  • SOC News

    New Microsoft Incident Response guides help security teams analyze suspicious activity

    New Microsoft Incident Response guides help security teams analyze suspicious activity>Microsoft Blog – Microsoft Incident ResponseMicrosoft Incident Response has introduced two one-page guides to help […]

    February 26, 2024

    Paul Davis

  • SOC News

    Ivanti vulnerabilities now actively exploited in massive numbers

    Ivanti vulnerabilities now actively exploited in massive numbers>Malware Bytes Blog – Pieter ArntzIvanti Connect Secure and Ivanti Policy Secure Gateways have two vulnerabilities that are […]

    February 26, 2024

    Paul Davis

←Newer Posts Older Posts→

Categories


  • AI / ML
  • AIOps
  • IT/OT News
  • Open Source
  • Security Industry News
  • Security Strategy News
  • SOC News
  • Zero Trust

Recent Posts


  • Cybersecurity Threat Landscape and 2026 OutlookJanuary 11, 2026
  • Cyber Resilience and Software EscrowJanuary 11, 2026
  • AI & Humans: Making the Relationship Work – Schneier on SecurityJanuary 11, 2026
  • How AI is Streamlining the Underwriting Process for the Insurance IndustryJanuary 11, 2026

Tags


2nd Edition

Boston, USA

Pages

Links

F.A.Q.

Terms and Conditions

Support

Social

Twitter