Article: GitLab Revenue Jumps 29% in Fiscal Q2 - The Globe and Mail - published 29 days ago. Content: Business Overview and Strategic Focus. GitLab serves organizations ranging from startups to multi-national enterprises with its all-in-one DevSecOps ... https://www.theglobeandmail.com/investing/markets/markets-news/Motley%20Fool/34598120/gitlab-revenue-jumps-29-in-fiscal-q2/ Published: 2025 09 04 13:31:58 Received: 2025 09 04 15:42:10 Feed: Google Alert - devsecops Source: Google Alert Category: News Topic: DevSecOps |
Article: A Security Product Reference Model - published over 4 years ago. Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i... https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/ Published: 2021 04 16 21:30:24 Received: 2025 09 04 15:37:05 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 4 years ago. Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti... https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ Published: 2021 05 19 22:04:11 Received: 2025 09 04 15:37:05 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: How To Drive Value with Security Data - published over 4 years ago. Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co... https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/ Published: 2021 06 03 16:55:18 Received: 2025 09 04 15:37:05 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 4 years ago. Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal... https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ Published: 2021 06 08 16:05:55 Received: 2025 09 04 15:37:05 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: How To Drive Value with Security Data – The Full Talk - published over 4 years ago. Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio... https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ Published: 2021 06 12 20:00:24 Received: 2025 09 04 15:37:05 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: *NIX Command Line Foo - published almost 3 years ago. Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently. I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do... https://raffy.ch/blog/2022/11/27/nix-command-line-foo/ Published: 2022 11 27 17:28:05 Received: 2025 09 04 15:37:04 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: Leadership | Technology | Spirit - published about 1 year ago. Content: Who knows, I might just pick up my blogging again at some point. For now, I posted a short leadership related post on my Leadership | Technology | Spirit blog. Check it out. The post Leadership | Technology | Spirit first appeared on Future of Tech and Security: Strategy & Innovation with Raffy.... https://raffy.ch/blog/2024/08/28/leadership-technology-spirit/ Published: 2024 08 28 13:41:45 Received: 2025 09 04 15:37:04 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Mastering the Channel Ecosystem — Lessons From our BlackHat Panel - published about 2 months ago. Content: Thanks to everyone who joined the panel at the BlackHat Innovators & Investors Summit — it was a fast, practical session and full of real, repeatable advice. Below I’ve distilled the conversation into the speakers and the most actionable takeaways founders, investors and channel leaders can use. Who Spoke Daniel “DB” Bernard — Chief Business Offic... https://raffy.ch/blog/2025/08/14/mastering-the-channel-ecosystem-lessons-from-our-blackhat-panel/ Published: 2025 08 15 01:04:28 Received: 2025 09 04 15:37:04 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Security Chat 6.0: A Night of Ideas, Innovation, and Community in Zurich - published about 1 month ago. Content: Yesterday, we brought Security Chat back to Zurich for its sixth edition and it was everything I had hoped for: brilliant talks, a packed room, and the joy of reconnecting with friends old and new. What started back in 2012 as an informal gathering of security enthusiasts has grown into a tradition where community and ideas come together. This yea... https://raffy.ch/blog/2025/08/27/security-chat-6-0-a-night-of-ideas-innovation-and-community-in-zurich/ Published: 2025 08 27 12:43:21 Received: 2025 09 04 15:37:04 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: Go-to-Market Strategies for Small Security Companies - published 29 days ago. Content: Bringing a new product to market is hard—especially for small companies with limited sales resources. While large players can rely on global sales teams, most startups and scale-ups need to be smarter in how they approach their go-to-market (GTM) and route-to-market (RTM) strategies. Recently, I walked through a set of practical approaches for som... https://raffy.ch/blog/2025/09/04/go-to-market-strategies-for-small-security-companies/ Published: 2025 09 04 14:29:31 Received: 2025 09 04 15:37:04 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Disclosure advice for AI system developers - Professional Security Magazine - published 30 days ago. Content: Without these, reported bypasses might not be handled properly. That's among the advice from the UK official National Cyber Security Centre (NCSC) and ... https://professionalsecurity.co.uk/news/commercial-security/disclosure-advice-for-ai-system-developers/ Published: 2025 09 04 07:15:29 Received: 2025 09 04 15:22:01 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: Have the hackers behind the M&S cyberattack now targeted JLR? | ITV News - published 29 days ago. Content: Cyber security. Thursday 4 September 2025 at 12:05pm. Jaguar Land Rover has said its production and sales have been "severely disrupted" by a major ... https://www.itv.com/news/2025-09-04/have-the-hackers-behind-the-m-and-s-cyberattack-now-targeted-jlr Published: 2025 09 04 11:29:20 Received: 2025 09 04 15:21:59 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
Article: Iran MOIS Phishes 50+ Embassies, Ministries, Int'l Orgs - Dark Reading - published 29 days ago. Content: Researchers from Dream Security and Clear Sky Cyber Security ... They also employ contractors and local staff who may not be familiar with all the cyber ... https://www.darkreading.com/cyberattacks-data-breaches/iran-mois-50-embassies-ministries-intl-orgs Published: 2025 09 04 12:04:38 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: Which AI is winning the race for business users? - Business Reporter - published 29 days ago. Content: Although cyber-security experts quickly raised alarms about the risks commercial gen AI could pose to enterprise systems and data, a year or two ... https://www.business-reporter.co.uk/technology/which-ai-is-winning-the-race-for-business-users Published: 2025 09 04 12:23:02 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: Fintech foils heist, NotDoor backdoor, Salesloft-Drift continues - CISO Series - published 29 days ago. Content: Cyber Security Headlines. Fintech foils bank heist, NotDoor backdoor, Salesloft-Drift impact continues drifting. By. Hadas Cassorla. -. September 4 ... https://cisoseries.com/fintech-foils-bank-heist-notdoor-backdoor-salesloft-drift-impact-continues-drifting/ Published: 2025 09 04 12:27:26 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
Article: How To Put AI-Powered Cybersecurity In The Boardroom - Cybercrime Magazine - published 29 days ago. Content: Gartner defines Adversarial Exposure Validation or AEV as “technologies that deliver consistent, continuous, and automated evidence of the feasibility ... https://cybersecurityventures.com/how-to-put-ai-powered-cybersecurity-in-the-boardroom/ Published: 2025 09 04 13:24:55 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: How the newest ISAC aims to help food and agriculture firms thwart cyberattacks - published 29 days ago. Content: Food industry executives used to shrug off ransomware and cyber-espionage risks. A new group is helping to change that, but its reach remains ... https://www.cybersecuritydive.com/news/food-isac-growth-supply-chain/758505/ Published: 2025 09 04 13:44:13 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: Majority of Kiwi businesses encounter cyber threats | Insurance Business New Zealand - published 29 days ago. Content: A recent study commissioned by the National Cyber Security Centre (NCSC) and conducted by The Research Agency (TRA) has found that more than half ... https://www.insurancebusinessmag.com/nz/news/cyber/majority-of-kiwi-businesses-encounter-cyber-threats-548434.aspx Published: 2025 09 04 15:09:22 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
Article: Rey claims credit for second Jaguar Land Rover cyber attack in six months - Financial Times - published 29 days ago. Content: Jake Moore, global cyber security adviser at ESET, said the nature of the JLR attack showed how young hacking groups were “brazenly confident” about ... https://www.ft.com/content/ee1a6135-85d6-43d1-9049-da2896844aae Published: 2025 09 04 15:09:37 Received: 2025 09 04 15:21:58 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
![]() |
Article: Cybersecurity / DevSecOps at Jason Keeports | F6S Member Profile - published 29 days ago. Content: DevOps Engineer, SRE, DevSecOps lead, or Cloud Architect in a remote-first team. Experience. About Jason Keeports - F6S Profile. Cybersecurity ... https://www.f6s.com/member/jason-keeports Published: 2025 09 04 13:14:45 Received: 2025 09 04 15:21:29 Feed: Google Alert - devsecops Source: Google Alert Category: News Topic: DevSecOps |
![]() |
Article: ISC Stormcast For Thursday, September 4th, 2025 https://isc.sans.edu/podcastdetail/9598, (Thu, Sep 4th) - published 29 days ago. Content: https://isc.sans.edu/diary/rss/32258 Published: 2025 09 04 13:59:15 Received: 2025 09 04 15:13:44 Feed: SANS Internet Storm Center, InfoCON: green Source: SANS Internet Storm Center, InfoCON: green Category: Alerts Topic: Vulnerabilities |
Click to Open Code Editor