Please turn on your JavaScript for this page to function normally.
How to safely dispose of old tech
How to safely dispose of old tech without leaving a security risk

Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones, which creates security risks related to the data on these devices. The …

cybersecurity week in review
Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are …

cloud
Cloud security gains overshadowed by soaring storage fees

Storage fees in general (e.g., API calls, operations, data access) comprise 49% of an average user’s service bill, compared to the actual stored capacity, according to a study …

gamified simulations
Can AI-powered gamified simulations help cybersecurity teams keep up?

Traditional training often lacks the hands-on experience cybersecurity teams need to counter advanced threats. AI-powered gamified simulations combine artificial intelligence …

Infosec products of the week
New infosec products of the week: March 7, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red Canary, and Sonatype. Outpost24 introduces …

cybersecurity jobs usa
Cybersecurity jobs available right now in the USA: March 6, 2025

CISO Amplitude | USA | Hybrid – No longer accepting applications As a CISO, you will develop, implement, and maintain a comprehensive security strategy aligned with …

How to prevent data leakage
How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the …

CISO bookshelf
The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, …

GenAI
89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal …

Vulnerability
The 5 stages of incident response grief

Whether we recognize it or not, anytime an incident occurs, it sets off the grieving process. But grief isn’t a bad thing: it’s how we process our emotional reactions and move …

Fix Inventory
Fix Inventory: Open-source cloud asset inventory tool

Fix Inventory is an open-source tool for detecting compliance and security risks in cloud infrastructure accounts. It was built from the ground up for cloud-native …

cloud
Why multi-cloud security needs a fresh approach to stay resilient

As enterprises expand their multi-cloud strategies to drive agility and scalability, CISOs must prioritize cyber resilience across diverse cloud platforms. The complexities of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools