BreachLock Named Representative Vendor in the 2026 Gartner Market Guide for Adversarial Exposure Validation
New York, United States, 21st April 2026, CyberNewswire
Posts by The Security Ledger
The Ungoverned Workforce: Cybersecurity Insiders Finds 92% Lack Visibility Into AI Identities
Washington D.C., USA, 21st April 2026, CyberNewswire
Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits
Philadelphia, United States / Pennsylvania, 14th April 2026, CyberNewswire
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action
Austin, Texas, United States, 9th April 2026, CyberNewswire
Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec
New York, New York, 1st April 2026, CyberNewswire
2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
San Francisco, USA, 25th March 2026, CyberNewswire
Gcore Radar report reveals 150% surge in DDoS attacks year-on-year
Luxembourg, Luxembourg, 24th March 2026, CyberNewswire
CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026
Austin, United States, 19th March 2026, CyberNewswire
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
Austin, TX, USA, 19th March 2026, CyberNewswire
Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents
New York, United States, 17th March 2026, CyberNewswire
GitGuardian released their latest Secrets Sprawl report, which found a sharp increase in exposed developer secrets (34%), driven by AI-powered and scaled software development. Read on!
GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub
New York, NY, 17th March 2026, CyberNewswire
You rely on a power wheelchair with cool, software features. But could those same features be used by to seize control of your chair and crash it into a wall or throw it (and you) down a set of stairs? Check out our latest podcast to find out!
securityledger.com/2026/02/when... #cybersecurity
The #StrangerThings concept of the “Upside Down” is a pretty useful way to think about the risks lurking in the software we all rely on. A new report from @reversinglabs.com shines a light into that dark world. #appsec #softwaresupplychain securityledger.com/2026/01/tech...
A report that dropped this week by Lucija Valentić, a threat researcher at ReversingLabs described her discovery of malicious packages on npm and GitHub that abused Ethereum smart contracts to facilitate malicious command and control.
securityledger.com/2025/09/ethe...
In our latest podcast we talked with Tanya Janca (@shehackspurple.bsky.social ) about her new book Alice and Bob Learn Secure Coding.
Props to Sam Curry (@zlz.bsky.social) and Shubham Shah for exposing severe security flaws in the web infrastructure used by #Subaru to manage and surveil...err... "monitor" smart vehicles. #autocyber #telematics #dataprivacy securityledger.com/2025/01/more...
In this clip from our latest #podcast, David Kellerman the Field #CTO at Cymulate explains how the company's attack simulation feature works - helping organizations test the effectiveness of security products in real life attack scenarios. Check out the full interview here: lnkd.in/efyEiJRe
🎙️ In this clip from our latest podcast, host @paulroberts.bsky.social asks David Kellerman, Field #CTO at #Cymulate about security tool overload and whether enterprises might already have all they need to protect themselves from major cyber risks. #podcast #sponsored
Our latest podcast is out (episode #259). Our guest: @sophossecurity.bsky.social #CISO Ross McKerchar who talks about Sophos' recent report Pacific Rim detailing a 6 year long cyber campaign by #China based #APT actors targeting Sophos customers. securityledger.com/2024/11/paci...
Check out our new Spotlight Podcast with Jim Broome, President and #CTO at DirectDefense, a leading MSSP. Jim and host @paulroberts.bsky.social chat about D2's latest Security Operations Threat Report and the evolution of threats and attacks driven by #AI. securityledger.com/2024/05/spot...
In our latest #podcast, @paulroberts.bsky.social speaks with renowned #IoT hacker Dennis Giese about his mission to liberate robot vacuums from OEM control, letting owners maintain their devices and control the data they collect. #cybersecurity #righttorepair
securityledger.com/2023/12/epis...
Dragos Security on Wednesday unveiled a "Community Defense Program" to provide free cybersecurity software for small utilities providing water, electric, and natural gas in the United States. securityledger.com/2023/12/citi...
The slow motion #appsec car crash known as #MOVEit hit home, highlighting a sad fact of our modern life in the U.S.: the utter lack of online safety and security. securityledger.com/2023/11/apps...
How do we improve software quality and end the epidemic of shoddy, exploitable software harming consumers, communities and businesses? To start, we need to change the way we think and talk about software-based risks, writes @paulroberts.bsky.social.
securityledger.com/2023/10/opin...
In this Security Ledger #Podcast @shehackspurple.bsky.social of the group We Hack Purple (now SemGrep), talks with Security Ledger host @paulroberts.bsky.social about the biggest security mistakes that #DevSecOps teams make, and the #OSS “tragedy of the commons.” securityledger.com/2023/10/epis...
Expert Insight, Derek Kernus, the Director of Cybersecurity Operations at DTS talks about the challenges facing small businesses that are under pressure to adopt #cybersecurity best practices without breaking their budget. #SME #opinion #riskmanagement securityledger.com/2023/10/what...
In this podcast, host Paul Roberts speaks with @colinoflynn.bsky.social of the firm NewAE about his work to patch shoddy software on his #Samsung electric oven – and big questions about our rights to fix, tinker with or replace the software that powers connected stuff. #BlackHat2023 #righttorepair
All eyes are on the AIVillage at @defcon.bsky.social but is a village the best format for assessing the #cyberrisks of #AI? Experts have their doubts…