Application Security

Article

Privacy Teams Expected to Guard AI Future

Suparna Goswami  •  February 22, 2024

Webinar

Harnessing Exploitability Information for Effective Prioritization

Jay Jacobs, Author of EPSS and Chief Data Scientist, Cyentia Institute , Chris Madden, Distinguished Technical Security Engineer, Yahoo , Jeffrey Martin, VP of Product Marketing, Mend.io  •  February 13, 2024

Whitepaper

Evolving From Monitoring: Why Observability Is Essential for Your Business

February 6, 2024

Article

Surging Supply Chain Attacks: Risks and Defenses

Tony Morbin  •  January 3, 2024

Article

API Security Trends: Collaborative Strategies for Leaders

Anna Delaney  •  January 2, 2024

Article

What's on the 2024 Legislative Wish List for Congress?

Chris Riotta  •  January 1, 2024

Article

Cybersecurity Trends to Watch in 2024

Anna Delaney , Cal Harrison  •  January 1, 2024

Article

Sizing Up the Worst Healthcare Hacks of 2023

Marianne Kolbasuk McGee  •  December 27, 2023

Article

Open-Source Linux Distribution for Blue Teaming

Tony Morbin  •  December 21, 2023

Article

CISA Warns of Russian Hackers Targeting JetBrains Software

Chris Riotta  •  December 13, 2023

Article

Proof of Concept: A Guide to Navigating Software Liability

Anna Delaney  •  December 8, 2023

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.