Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains

Security teams are dealing with pressures tied to AI use, geopolitical instability, and expanding cybercrime that reach beyond technical controls, according to findings from the World Economic Forum’s Global... Read more »

Cutting through the noise: SaaS accelerators vs. enterprise AI

The Security Think Tank considers what CISOs and buyers need to know to cut through the noise around AI and figure out which AI cyber use cases are worth... Read more »

Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience

In this Help Net Security interview, Liad Shnell, CISO and CTO at Rakuten Viber, discusses how messaging platforms have become critical infrastructure during crises and conflicts. He explains how... Read more »

Turning cyber metrics into decisions leaders can act on

In this Help Net Security video, Bryan Sacks, Field CISO at Myriad360, explains how security leaders can measure cybersecurity in ways that matter to executives and boards. He argues... Read more »

Teaching cybersecurity by letting students break things

Cybersecurity students show higher engagement when the work feels tangible. A new study from Airbus Cybersecurity and Dauphine University describes what happens when courses move beyond lectures and place... Read more »

What insurers expect from cyber risk in 2026

Technology shifts, policy decisions, and attacker behavior are changing at the same time, and their effects increasingly overlap. Insurers, brokers, and security teams are feeling that pressure across underwriting,... Read more »

Cybersecurity jobs available right now: January 13, 2026

CISO CSIRO | Australia | Remote – View job details As a CISO, you will lead and manage CSIRO’s cyber security strategy and program in alignment with the broader... Read more »

How one IT chief shifted the needle on a reactive IT strategy

In spite of headlines that suggest every business should be ploughing vast sums of money into tech innovation, the reality remains that IT plays a supporting role for most... Read more »

U.S. CISA adds a flaw in Gogs to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Gogs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Gogs path traversal... Read more »

Meta fixes Instagram password reset flaw, denies data breach

Meta fixed an Instagram password reset flaw that let third parties send reset emails, while denying a data breach despite leak claims. Meta confirmed fixing an Instagram password reset... Read more »
Subscribe to our Newsletter