ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Announcements

Announcements
Managing Identity Risk to Strengthen Business Continuity
Managing Identity Risk to Strengthen Business Continuity

May 21, 2025

Extracting Credentials from Microsoft Deployment Toolkit Shares - Red Teaming
Extracting Credentials from Microsoft Deployment Toolkit Shares - Red Teaming

Cyber Security News

May 21, 2025

Addressing the Challenges of Enterprise Security: Insights from Mithilesh Ramaswamy
Addressing the Challenges of Enterprise Security: Insights from Mithilesh Ramaswamy

Tech Times

May 19, 2025

Unlocking the Future: Multi-Party Threshold Laplace Cryptography Platforms to Revolutionize Data Security by 2025–2030
Unlocking the Future: Multi-Party Threshold Laplace Cryptography Platforms to Revolutionize Data Security by 2025–2030

Macho Levante

May 19, 2025

CISO's Guide for Defending against the Top 8 Cyber Threats in 2025
CISO's Guide for Defending against the Top 8 Cyber Threats in 2025

May 19, 2025

Guide to Cloud API Security – Preventing Token Abuse
Guide to Cloud API Security – Preventing Token Abuse

Cyber Security News

May 17, 2025

AI Security Frameworks – Ensuring Trust in Machine Learning
AI Security Frameworks – Ensuring Trust in Machine Learning

Cyber Security News

May 17, 2025

Best 12 SaaS Security Tools to Protect Your Cloud Applications
Best 12 SaaS Security Tools to Protect Your Cloud Applications

Security Boulevard

May 15, 2025

Integrity: An Overlooked Foundation of Zero Trust
Integrity: An Overlooked Foundation of Zero Trust

May 15, 2025

How to Get Your SaaS Cloud Security Questions Answered: Leveraging CAIQ v4 for Self-Assessments
How to Get Your SaaS Cloud Security Questions Answered: Leveraging CAIQ v4 for Self-Assessments

Oracle Cloud Applications Blog

May 14, 2025

INE Security Alert: Top 5 Takeaways from RSAC 2025
INE Security Alert: Top 5 Takeaways from RSAC 2025

DevOps.com

May 13, 2025

European Vulnerability Database Launches Amid US CVE Chaos
European Vulnerability Database Launches Amid US CVE Chaos

Infosecurity Magazine

May 13, 2025

The tradition in cyber insurance is broken - and it's putting small businesses in danger
The tradition in cyber insurance is broken - and it's putting small businesses in danger

Insurance Business

May 12, 2025

Looming Threat of Quantum Computing Is the Internet Ready
Looming Threat of Quantum Computing Is the Internet Ready

Happiest Minds

May 12, 2025

A CISO's Guide to Reporting on Cloud Security (Without Putting Everyone to Sleep)
A CISO's Guide to Reporting on Cloud Security (Without Putting Everyone to Sleep)

May 12, 2025

Learn about Non Human Identity Security and Attack Demonstration with Astrix
Learn about Non Human Identity Security and Attack Demonstration with Astrix

May 12, 2025

Protecting Law Firms Against Cyber Threats: The Role of AI, Cerrtifications, and Compliance
Protecting Law Firms Against Cyber Threats: The Role of AI, Cerrtifications, and Compliance

Legal Service India

May 11, 2025

Watch the AI Risk Management Paper & AI Working Group Overview
Watch the AI Risk Management Paper & AI Working Group Overview

May 8, 2025

Daniele Cattedu: “CSA is at the forefront of addressing the security implications of emerging technologies, such as AI.”
Daniele Cattedu: “CSA is at the forefront of addressing the security implications of emerging technologies, such as AI.”

Common Good Cyber

May 8, 2025

How to Protect M&A in FinServ: A Conversation with Visa and Expel
How to Protect M&A in FinServ: A Conversation with Visa and Expel

May 7, 2025