Latest #cybersecurity Threads Top

CommunityNews
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.
New
CommunityNews
65% Of Employees Bypass Cybersecurity Measures, New Study Finds. More than half of workers surveyed say they’ve shared confidential data...
New
CommunityNews
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog. Discover how Hardware Security Modules (HSMs) provide robust ...
New
CommunityNews
Despite a rise in cyberattacks and breaches, the cybersecurity industry is by no means exempt from the uncertainty inspired by the curren...
New
brainlid
Episode 173 of Thinking Elixir. We delve into the tricky world of cybersecurity with our guest, Michael Lubas. We touch on the widely-dis...
New
New
First poster: apsori
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
First poster: bot
Sun Tzu wouldn’t like the cybersecurity industry. Sun Tzu quotes are beloved to the point of overuse in cybersecurity. Here’s why the le...
New
New
ManningBooks
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a...
New

This Week's Trending Top

This Month's Trending Top

CommunityNews
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.
New

This Year's Trending Top

First poster: apsori
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
CommunityNews
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog. Discover how Hardware Security Modules (HSMs) provide robust ...
New
CommunityNews
65% Of Employees Bypass Cybersecurity Measures, New Study Finds. More than half of workers surveyed say they’ve shared confidential data...
New

Last Three Year's Trending Top

ManningBooks
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a...
New
First poster: bot
Open Cybersecurity Schema Framework. Open Cybersecurity Schema Framework has 4 repositories available. Follow their code on GitHub.
New
First poster: bot
Sun Tzu wouldn’t like the cybersecurity industry. Sun Tzu quotes are beloved to the point of overuse in cybersecurity. Here’s why the le...
New
New
brainlid
Episode 173 of Thinking Elixir. We delve into the tricky world of cybersecurity with our guest, Michael Lubas. We touch on the widely-dis...
New
New
CommunityNews
Despite a rise in cyberattacks and breaches, the cybersecurity industry is by no means exempt from the uncertainty inspired by the curren...
New

Trending Over Three Years Top

Exadra37
This past weekend saw the latest competition take place and the newest iPhone, the iPhone 13 Pro running the latest and fully patched ver...
New
ManningBooks
Cyber Security Career Guide unlocks your pathway to becoming a great security practitioner. You’ll learn how to reliably enter the securi...
New
First poster: bot
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020. https://www.techrepublic.co...
New
First poster: bot
U.S. chipmaker Nvidia has confirmed that it’s investigating a cyber incident that has reportedly downed the company’s developer tools and...
New
First poster: bot
About Apple threat notifications and protecting against state-sponsored attacks. Apple threat notifications are designed to inform and a...
New
First poster: bot
In an effort to make IT pros’ jobs easier, Jack Wallen offers cybersecurity tips to end users–in particular, what not to do to keep compa...
New
  • Follow
  • Join
  • Shape
the conversation

Latest on Devtalk

Devtalk

Similar Portals

    None added yet

Get money off!

The Pragmatic Bookshelf

35% off any eBook

Manning Publications

45% off any item

The Pragmatic Studio

20% off any course

Simply use coupon code "devtalk.com" at checkout. Where applicable this coupon can be used for an many items and as many times as you like!