Please turn on your JavaScript for this page to function normally.
CISO
Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and …

critical infrastructure
UNIDIR Intrusion Path: New framework to analyze ICT environment activities

Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are …

Bluetooth
Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update to how devices manage privacy and power. The update, …

Spire
SPIRE: Toolchain of APIs for establishing trust between software systems

SPIRE is a graduated project of the Cloud Native Computing Foundation (CNCF). It’s a production-ready implementation of the SPIFFE APIs that handles node and workload …

cyber risks
Layoffs pose a cybersecurity risk: Here’s why offboarding matters

In this Help Net Security video, Chase Doelling, Principal Strategist at JumpCloud, discusses the overlooked security risks associated with improper offboarding. Though many …

Biohazard
Despite drop in cyber claims, BEC keeps going strong

Ransomware claims stabilized in 2024 despite remaining the most costly and disruptive type of cyberattack, according to Coalition. 60% of 2024 claims originated from BEC and …

cybersecurity week in review
Week in review: The impact of a CVE-free future on cyber defense, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: What a future without CVEs means for cyber defense For many cybersecurity …

patch tuesday
May 2025 Patch Tuesday forecast: Panic, change, and hope

May 2025 Patch Tuesday is now live: Patch Tuesday: Microsoft fixes 5 actively exploited zero-days April was an event-filled month for cybersecurity. Patch Tuesday came to us …

AWS
Analyze resource-based policy dependencies across your AWS Organizations accounts

Managing multiple AWS accounts in an organization can get complicated, especially when trying to understand how services and permissions are connected. The Account Assessment …

Wi-Fi 7
Wi-Fi 7 trials show big performance gains for enterprise networks

The next generation of wireless technology is getting a real-world test, and the results are promising. Recent trials led by the Wireless Broadband Alliance (WBA), in …

non-human identities
How agentic AI and non-human identities are transforming cybersecurity

Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the …

arrows
Global cybersecurity readiness remains critically low

Only 4% of organizations worldwide have achieved the ‘mature’ level of readiness required to withstand cybersecurity threats, according to Cisco’s 2025 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools