[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
The Cybersecurity Pulse
TCP #120: Opus 4.6 uncovers 500 vulns; 50K forecasted in 2026; and RSAC Innovation Sandbox Announced
The Great Decoupling: Separating Your SIEM from Your Data Layer
TCP #119: How Palantir Secures AI, OpenClaw Dumpster Fire, and Malicious Corgis
TCP #118: Clawdbot Meltdow, Telnet Strikes Again, and More AI Prompt Injection Vulns
TCP #117: Mandia is Building Again, AI Prompt Injection Season Continues, and China Bans Western Security
TCP #116: Starlink v. Iran, Agents Attack Agents, and CrowdStrike's $1.16B Week
TCP #115: Venezuela Cyberattack, AI Security's Friction Paradox, MongoBleed, and More
AI in Security: Lessons from 2025 and What’s Next
The Best of The Cybersecurity Pulse — 2025 Edition
TCP #114: AI in SecOps 2026+; CTI Forecast; and Venezuela Blames US for Cyberattack
Deploy Securely
Prescient Security and StackAware: building audit-ready AI governance
StackAware and Armilla AI: advancing AI insurance
How StackAware found 3 key security risks in Cursor
Driving ISO 42001 certification in AI-powered healthcare with Eleos
Human-in-the-loop
3 risks from AI-powered no-code tools and how to manage them to avoid data breaches and fines
SecureForge is a scam
California’s Automated-Decision System Regulation
Building trust and accelerating healthcare innovation: responsible AI at Rightway
Relentless AI Red Teaming
Omer on Security
Can Splunk Overcome Its Innovator's Dilemma?
How to Jumpstart Your Collaboration with the Data Team
The Inside Scoop on Insider Risk
Help Stop SOAR Abuse
You've Never Seen Lock-In Like This Before
Survivor's Guide to SIEM in 2024
Navigating a Market for Lemons
Lacework’s AI Didn’t Work
Busting Four Myths on Usage-Based Pricing for Security Operations
The Security Data Fabric Identity Crisis
Cloud Native Detection
Multi-Cloud Detection at Scale: A Normalization Framework
The Cloud-Native Detection Engineering Handbook
Return on Security
💰 Security, Funded #230 - The One Vendor to Rule Them All
2025 State of the Cybersecurity Market: $25B Funding, $76B M&A, and What's Next
💰 Security, Funded #229 - We Finally Defeated January
💰 Security, Funded #228 - Even RSA Is Raising Again
💰 Security, Funded #227 - Nobody Told M&A to Slow Down
💰 Security, Funded #226 - The Privilege(d) Acquisition
💰 Security, Funded #225 - New Year, Same Money Printer
The 2025 Return on Security Year-End Letter
💰 Security, Funded #224 - Santa Rally Mode Activated 🎅
The Opportunity Cost of Data Privacy
Venture in Security
Stop comparing safety and cybersecurity, they have very little in common
The lazy myth that CISOs “don’t understand the business” has to go
If you ask these two questions, you’re asking the wrong thing
ServiceNow is betting on “workflow gravity” to win against the platforms of Palo Alto, CrowdStrike, Cisco, Zscaler, and Microsoft
Going into 2026: what founders and security leaders need to know
Going deeper into layer zero: must-know for the cyber industry insiders
Top 12 deep dives to understand the cybersecurity market
Most cyber companies simply can’t scale as fast as the new AI startups
Nobody ever gets credit for fixing security problems that never happened
Not getting incentives right can kill a security initiative or a security startup
Detection at Scale
D@S #75 - The Bigger Risk Is Refusing to Adopt AI Agents At All
D@S #74 - Compass' Ryan Glynn on Why LLMs Shouldn't Make Security Decisions — But Should Power Them
Threat Hunting with Claude Code and MCP
D@S #73 - Veeva Systems' Mike Vetri on Building Resilient Security Teams in the Age of AI
Building Threat Models with MCP and AI Agents
D@S #72 - Trustpilot's Gary Hunter on Structuring Security Knowledge for AI Success
2025 Wrapped: Essential Reading on AI in Security Operations
D@S #71 - CoreWeave's Slava Klimovs on Threat-Model-Driven Security and the AI-First Future
The State of AI in Security Operations: 5 Patterns That Defined 2025
D@S #70 - GreenSky's Ken Bowles on Protecting Crown Jewels First and AI's Real Role in the SOC
Latio Pulse
The 5 Security Features that will lead in 2026, and 3 that should
Emerging Categories: The Evolution of AI SOC
Shai Hulud 2.0: Analysis and Community Resources
Unpacking Wizdom and GitHub Universe 2025
The 2025 Latio Cloud Security Report is Live!
Fixing the Blind Spot in Endpoint Security
LotR Episode 9: The SOC Data Breakdown
Unpacking the 2025 AI Security Acquisitions
LotR Episode 8: What is Reachability?
LotR Episode 7: Securing AI Applications
Detection Engineering Weekly
DEW #145 - Modified Z-Score for Anomaly Detection, Watermarking for Audit Logs -> SIEM and Zack gives you all an RFC for homework
DEW #144 - Pyramid of Permanence and 🦞OpenClaw 🦞 Security Dumpster Fires
DEW #143 - Suppressing False Positives at Scale, Silencing EDRs & Detection Fidelity via Social Network Analysis
DEW #142 - Slack's Agentic Triage Architecture, Detection <3's Data and Sigma evals
DEW #141 - K8s Detection Engineering, macOS EDR evasion, Cloud-native detection handbook
What are Composite Detections?
What are Atomic Detection Rules?
DEW #140 - SVG Filter ClickJacking, Detection Engineering "Onboarding" and React2Shell spotlight
DEW #139 - Detection Surface, Frontier Models are good at SecOps & THREE YEAR ANNIVERSARY!
DEW #138 - Sigma's Detection Quality Pipeline, Anthropic finds AI-first APT & eBPF shenanigans
Resilient Cyber
Resilient Cyber Newsletter #84
AI is Ready for Production, Security, Risk and Compliance Isn't
The Agentic AI Governance Blind Spot
Hacking the OpenClaw Hype
It's Never Too Late To Hack Your Career
Resilient Cyber Newsletter #83
A Zero Trust-centric Approach to AI Security
Capital, Competition and Cybersecurity
Resilient Cyber Newsletter #82
Secure-by-Design Goes Prime Time
The OSINT Newsletter
The OSINT Newsletter - Issue #94
The OSINT Newsletter - Issue #93
Episode 11 - OSINT With AI, New Methods, and the Tools Shaping Modern Investigations
The OSINT Newsletter - Issue #92
The OSINT Newsletter - Issue #91
Episode 10 - Working With and Against AI, and Why Certifications Aren’t the Answer
The OSINT Newsletter - Issue #90
Episode 9 - Image OSINT, Offline Tradecraft, and Tracking Influence at Scale
The OSINT Newsletter - Issue #89
The OSINT Newsletter - Issue #88
© 2026 RiskDiscovery | Sponsored by:
Deception Logic