envelope envelope search heart heart-on heart-off bookmark-on bookmark close clock arrow down arrow up list arrow right feed link tag glasses star share twitter ampersand hamburger add
Serendeputy
Sign In

The custom newsfeed you control

Build your newsfeed from an index of the current open web, classified with 100mm tags (topics, tweeters, linkers and more) and overlaid with your Twitter feed. Then tune your algorithm to your personal interests and get your newsfeed via web, email or RSS.

Start by organizing your Twitter feed

How Serendeputy works for you

Security

  • Trending
  • Latest
  • Profile

Security tag sponsored by:

CompTIA Security+ Certification Kit: Exam SY0-601

  • Fundamentals of cloud data security and protection

    blog.hyland.com | 45 minutes ago | Article Details | Related Articles | Share
    • Cloud
    • Data security
    • Fundamental
    • Information security
    • Protection
    • 280 Tags
    • 1 Tweet
    • 38 Twitter Lists
  • TikTok CEO plans rigorous defenses in Congress against claims the app is a US security threat

    cyberscoop.com | 9 hours ago | Article Details | Related Articles | Share
    • CEO
    • DC Health Link
    • Defense
    • Security
    • TikTok
    • 275 Tags
    • 3 Tweets
    • 1 Post
    • 22 Twitter Lists
    • 2 Linking Sites
    • 1 Feed
  • Council Post: Securing The Future: The Most Critical Cybersecurity Trends Of 2023

    forbes.com | 1 day ago | Article Details | Related Articles | Share
    • 2023
    • Computer security
    • Council
    • Critical
    • Trends
    • 301 Tags
    • 5 Tweets
    • 104 Twitter Lists
  • Waterfall Security, TXOne Networks Launch New OT Security Appliances

    securityweek.com | 1 day ago | Article Details | Related Articles | Share
    • Launch
    • Network
    • Pwn2Own
    • Security appliance
    • Waterfall
    • 147 Tags
    • 5 Tweets
    • 32 Twitter Lists
    • 1 Feed
  • TSA issues additional cybersecurity rules for the aviation sector - Help Net Security

    helpnetsecurity.com | 21 hours ago | Article Details | Related Articles | Share
    • Computer security
    • Cyber Resilience
    • David Pekoske
    • Net
    • TSA
    • 100 Tags
    • 1 Tweet
    • 3 Twitter Lists
  • Kusari's Software Supply Chain Security Overview

    kusari.dev | 8 hours ago | Article Details | Related Articles | Share
    • Kusari
    • Log4j
    • Overview
    • Software
    • Supply chain security
    • 220 Tags
    • 2 Tweets
    • 2 Twitter Lists
  • Time to Double Check Those Data Center Deadbolts: A Security Review for 2023

    datacenterknowledge.com | 1 day ago | Article Details | Related Articles | Share
    • 2023
    • Data center
    • Dead bolt
    • North American Electric Reliability Corporation
    • Security
    • 338 Tags
    • 1 Tweet
    • 27 Twitter Lists
  • Overcoming Security Challenges for Cloud Adoption - Kovair Blog

    kovair.com | 6 hours ago | Article Details | Related Articles | Share
    • Adoption
    • Blog
    • Challenges
    • Cloud Security Alliance
    • Principle of least privilege
    • 180 Tags
    • 1 Tweet
    • 1 Twitter List
  • 13 Cloud Security Best Practices & Tips for 2023 | eSecurity Planet

    esecurityplanet.com | 18 hours ago | Article Details | Related Articles | Share
    • 2023
    • Best practice
    • Cloud computing security
    • Iam Tools
    • Planet
    • 268 Tags
    • 1 Tweet
    • 7 Twitter Lists
    • 1 Feed
  • Homeland Security Committee convenes hearing to scrutinize cybersecurity risks to healthcare sector - Industrial Cyber

    industrialcyber.co | 1 day ago | Article Details | Related Articles | Share
    • Computer security
    • Cyber
    • Health care
    • Homeland Security Committee
    • Risk
    • 269 Tags
    • 2 Tweets
    • 9 Twitter Lists
    • 1 Feed
  • Highlights from the New U.S. Cybersecurity Strategy – Krebs on Security

    krebsonsecurity.com | 10 hours ago | Article Details | Related Articles | Share
    • Brian Krebs
    • Computer security
    • Highlights
    • Strategy
    • Ted Schlein
    • 324 Tags
    • 1 Tweet
    • 3 Twitter Lists
  • Software supply chain security practices are maturing — but it's a work in progress

    reversinglabs.com | 1 day ago | Article Details | Related Articles | Share
    • Glamour of the Kill
    • SLSA
    • Software
    • Supply chain security
    • Work in Progress
    • 278 Tags
    • 1 Tweet
    • 9 Twitter Lists
  • How important is security for an affiliate blog? 

    affiliategathering.com | 21 hours ago | Article Details | Related Articles | Share
    • Affiliate
    • Blog
    • Database security
    • Malware
    • Potentially unwanted program
    • 245 Tags
    • 1 Tweet
    • 1 Feed
  • It's impossible to review security cameras in the age of breaches and ransomware

    androidcentral.com | 2 days ago | Article Details | Related Articles | Share
    • Camera
    • Closed-circuit television
    • It's Impossible
    • Ransomware
    • Security
    • 246 Tags
    • 4 Tweets
    • 73 Twitter Lists
    • 1 Feed
  • Designing security for people – Richard Bartlett

    rgbartlett.co.uk | 15 hours ago | Article Details | Related Articles | Share
    • Advanced persistent threat
    • Authorization
    • NATO Training Mission-Afghanistan
    • Ransomware
    • Richard Bartlett
    • 156 Tags
    • 1 Post
  • Week in review: Kali Linux gets Purple, Microsoft zero-days get patched - Help Net Security

    helpnetsecurity.com | 3 days ago | Article Details | Related Articles | Share
    • Kali Linux
    • Microsoft
    • Patched
    • Security
    • Week in Review
    • 318 Tags
    • 7 Tweets
    • 38 Twitter Lists
    • 2 Feeds
  • Data Security: What It Is, Importance, Types, and Tips

    cheapsslshop.com | 1 day ago | Article Details | Related Articles | Share
    • Data masking
    • Data security
    • IP address spoofing
    • Tips
    • Trick Hackers
    • 310 Tags
    • 1 Tweet
    • 3 Twitter Lists
  • Council Post: Top 10 Cloud Security Checkpoints That Can Save Your Business

    forbes.com | 1 day ago | Article Details | Related Articles | Share
    • Checkpoint
    • Cloud computing security
    • Council
    • Save
    • Top 10
    • 230 Tags
    • 1 Tweet
  • Supply Chain Attacks and Open Source Libraries by Brilliance Security Magazine Podcast

    anchor.fm | 1 day ago | Article Details | Related Articles | Share
    • Brilliance
    • Open source
    • Podcast
    • Security
    • Supply chain
    • 329 Tags
    • 1 Tweet
  • Cyber Security Headlines: Ransomware impacts 1,000 ships, Crypto influencer victimized by malware, Microsoft patches Azure flaws - CISO Series

    cisoseries.com | 1 day ago | Article Details | Related Articles | Share
    • Computer security
    • Malware
    • Microsoft
    • Rachel Platten
    • Ransomware
    • 300 Tags
    • 1 Tweet
  • 5th Annual Utility Cyber Security Forum 2023

    utilitycybersec.com | 1 day ago | Article Details | Related Articles | Share
    • 2023
    • Computer security
    • Cyber Resilience
    • Forum
    • Utility
    • 362 Tags
    • 1 Post
  • Biden admin’s cloud security problem: ‘It could take down the internet like a stack of dominos’

    politico.com | 2 days ago | Article Details | Related Articles | Share
    • Anne Neuberger
    • Biden
    • Cloud computing security
    • Dominos
    • Take Down
    • 288 Tags
    • 1 Tweet
  • Best Practices to Boost Your Data Security Posture

    soterosoft.com | 2 days ago | Article Details | Related Articles | Share
    • Alarm fatigue
    • Best practice
    • Data security
    • NIST Cybersecurity Framework
    • Posture
    • 275 Tags
    • 1 Tweet
    • 1 Twitter List
  • Cyber Security: Tips for Small Business to Protect Data 2022

    bestonlinenews.org | 3 days ago | Article Details | Related Articles | Share
    • Computer security
    • Data
    • Network security policy
    • Small business
    • Tips
    • 138 Tags
    • 1 Tweet
  • Cyber Security Audits — RiskAware | SMB and Corporate Cyber Security Services

    riskaware.io | 2 days ago | Article Details | Related Articles | Share
    • Audit
    • Computer security
    • Cyber
    • Security Service
    • SMB
    • 82 Tags
    • 1 Tweet
    • 1 Twitter List
  • What is Information Security (Infosec)? – TechTarget Definition

    techtarget.com | 7 days ago | Article Details | Related Articles | Share
    • Data at rest
    • Definition
    • Information security
    • Non-repudiation
    • TechTarget
    • 317 Tags
    • 5 Tweets
    • 103 Twitter Lists
  • Why TikTok's security risks keep raising fears

    abcnews.go.com | 5 days ago | Article Details | Related Articles | Share
    • Fears
    • Raising
    • Risk
    • Security
    • TikTok
    • 271 Tags
    • 1 Tweet
    • 35 Twitter Lists
  • Cloud Computing vs. Data Security - DATAVERSITY

    dataversity.net | 5 days ago | Article Details | Related Articles | Share
    • Cloud computing
    • Data loss prevention software
    • Data security
    • Information privacy
    • Rohan Sathe
    • 283 Tags
    • 1 Tweet
    • 243 Twitter Lists
  • Infosec products of the month: February 2023 - Help Net Security

    helpnetsecurity.com | 5 days ago | Article Details | Related Articles | Share
    • 2023
    • API Security
    • Information security
    • Net
    • Product
    • 317 Tags
    • 4 Tweets
    • 103 Twitter Lists
  • Food, Farms and Cyber Security: Agriculture Faces a Growing Problem

    techopedia.com | 4 days ago | Article Details | Related Articles | Share
    • Agriculture
    • Computer security
    • Cyber
    • Farm
    • Food
    • 367 Tags
    • 1 Tweet
    • 38 Twitter Lists
  • 2022 Security Breach Legislation

    ncsl.org | 4 days ago | Article Details | Related Articles | Share
    • Affirmative defense
    • Breach
    • Legislation
    • Ny Sb
    • Personal Information Protection and Electronic Documents Act
    • 200 Tags
    • 1 Tweet
    • 13 Twitter Lists
  • 5 Cyber Security tips for managing international business operations

    macrobusiness.com.au | 5 days ago | Article Details | Related Articles | Share
    • Business operations
    • Computer security
    • Cyber
    • International business
    • Tips
    • 216 Tags
    • 4 Tweets
    • 58 Twitter Lists
  • TikTok's security risks keep raising fears. Here's why

    abc7ny.com | 4 days ago | Article Details | Related Articles | Share
    • Fears
    • Raising
    • Risk
    • Security
    • TikTok
    • 272 Tags
    • 1 Tweet
    • 8 Twitter Lists
  • 4 Tips for Improving Cloud Security | CSA

    insidersecurity.co | 5 days ago | Article Details | Related Articles | Share
    • Cloud computing security
    • CSA
    • Data at rest
    • Encryption
    • Tips
    • 159 Tags
    • 1 Tweet
    • 21 Twitter Lists
  • Google Cloud doubles down on security in financial services

    scmagazine.com | 5 days ago | Article Details | Related Articles | Share
    • Doubles
    • Finance
    • Financial services
    • Google Cloud
    • Security
    • 156 Tags
    • 3 Tweets
    • 5 Twitter Lists
  • What is zero trust? A model for more effective security

    csoonline.com | 4 days ago | Article Details | Related Articles | Share
    • Imran Umar
    • Model
    • Trust
    • Zero
    • ZTA
    • 282 Tags
    • 1 Tweet
    • 6 Twitter Lists
  • Why TikTok’s security risks keep raising fears

    orlandosentinel.com | 4 days ago | Article Details | Related Articles | Share
    • Fears
    • Raising
    • Risk
    • Security
    • TikTok
    • 269 Tags
    • 1 Tweet
    • 8 Twitter Lists
  • What ITSM Pros Need to Know About Network Security

    itsm.tools | 7 days ago | Article Details | Related Articles | Share
    • Attack patterns
    • IT service management
    • Need to Know
    • Network security policy
    • PROS
    • 244 Tags
    • 6 Tweets
    • 15 Twitter Lists
    • 1 Feed
  • Join us at Microsoft Secure to discover the latest security solutions - Microsoft Security Blog

    microsoft.com | 5 days ago | Article Details | Related Articles | Share
    • Join Us
    • Microsoft
    • Secure
    • Security
    • Solution
    • 285 Tags
    • 7 Tweets
    • 4 Posts
    • 20 Twitter Lists
  • 34 Most Common Types of Network Security Protections | ESP

    esecurityplanet.com | 4 days ago | Article Details | Related Articles | Share
    • CASB
    • E.S.P.
    • Network security
    • Protection
    • Threat Intelligence Platform
    • 276 Tags
    • 2 Tweets
    • 1 Post
    • 15 Twitter Lists
    • 1 Feed
  • Endpoint Security and Network Monitoring News for the Week of March 17; Xage Security, ngrok, Hoxhunt, and More

    solutionsreview.com | 5 days ago | Article Details | Related Articles | Share
    • Browser security
    • Endpoint security
    • Large language model
    • Network monitoring
    • Supply chain security
    • 222 Tags
    • 1 Tweet
    • 6 Twitter Lists
    • 1 Feed
  • 5 Critical Components of Effective ICS/OT Security

    darkreading.com | 4 days ago | Article Details | Related Articles | Share
    • Cold River
    • Components
    • Critical
    • Security
    • System of systems
    • 252 Tags
    • 1 Tweet
    • 18 Twitter Lists
  • Understanding the Shared Responsibility Model, Critical Step to Ensure Cloud Security

    infosecurity-magazine.com | 3 days ago | Article Details | Related Articles | Share
    • Cloud computing security
    • Critical
    • Model
    • Responsibility
    • Understanding
    • 183 Tags
    • 1 Tweet
    • 31 Twitter Lists
  • What is Network Security? Definition, Threats & Protections

    esecurityplanet.com | 7 days ago | Article Details | Related Articles | Share
    • Colocation centre
    • Definition
    • Network Access Control
    • Network security
    • Protection
    • 334 Tags
    • 2 Tweets
    • 15 Twitter Lists
    • 1 Feed
  • 10 Network Security Threats Everyone Should Know | eSP

    esecurityplanet.com | 5 days ago | Article Details | Related Articles | Share
    • 10 Network
    • DNS spoofing
    • E.S.P.
    • Network security
    • Web threat
    • 278 Tags
    • 2 Tweets
    • 1 Post
    • 15 Twitter Lists
  • Known LockBit 3.0 ransomware IOCs and TTPs found in recent assaults, US security agencies reveal - Industrial Cyber

    industrialcyber.co | 5 days ago | Article Details | Related Articles | Share
    • Cyber
    • Industrial
    • Input/Output Control System
    • Ransomware
    • Security
    • 297 Tags
    • 1 Tweet
    • 9 Twitter Lists
    • 1 Feed
  • Top Tools for Your Cloud Data Security Stack in 2023

    smartdatacollective.com | 6 days ago | Article Details | Related Articles | Share
    • 2023
    • CASB
    • Cloud
    • Data security
    • OpenID Connect
    • 182 Tags
    • 3 Tweets
    • 3 Twitter Lists
    • 1 Feed
  • High-Altitude Espionage (Spy Balloon) and India’s National Security

    moderndiplomacy.eu | 5 days ago | Article Details | Related Articles | Share
    • Altitude
    • Balloon
    • Geospatial intelligence
    • National security
    • Spy
    • 386 Tags
    • 1 Tweet
    • 1 Twitter List
    • 1 Feed
  • About
  • How Serendeputy Works
  • Privacy Policy
  • Terms of Service

  • Serendeputy Blog
  • Customer Forum
  • @Serendeputy

  • Advertise on Serendeputy