Please turn on your JavaScript for this page to function normally.
Mir Kashifuddin
Quantifying cyber risk strategies to resonate with CFOs and boards

In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a …

CISO worry
Top 5 threats keeping CISOs up at night in 2025

Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing …

wireless
94% of Wi-Fi networks lack protection against deauthentication attacks

A recent report from Nozomi Networks Labs, based on an analysis of over 500,000 wireless networks worldwide, reveals that only 6% are adequately protected against wireless …

Infosec products of the week
New infosec products of the week: March 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace. SimSpace Stack Optimizer allows …

secure personal metadata
How to secure your personal metadata from online trackers

When it comes to safeguarding your privacy online, most people focus on securing passwords, encrypting communications, and clearing browsing history. While these practices are …

healthcare
CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has …

cybersecurity classics books
Cybersecurity classics: 10 books that shaped the industry

Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, …

cybersecurity jobs europe
Cybersecurity jobs available right now in Europe: March 13, 2025

Cloud Security Engineer TUI Group | Portugal | Hybrid – No longer accepting applications As a Cloud Security Engineer, you will contribute to the implementation of …

passkeys
Goodbye passwords? Enterprises ramping up passkey adoption

87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO …

NIST
NIST selects HQC as backup algorithm for post-quantum encryption

Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup …

NetBird
NetBird: Open-source network security

NetBird is an open-source solution that integrates a configuration-free peer-to-peer private network with centralized access control, providing a single platform to build …

burnout
Burnout in cybersecurity: How CISOs can protect their teams (and themselves)

Cybersecurity is a high-stakes, high-pressure field in which CISOs and their teams constantly battle threats, compliance requirements, and business expectations. The demand …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools