Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
June 18, 2025
Join Pro
LOGIN
13 hours ago
Free Forever, No BS: Inside Bitwarden’s Growth Playbook with Gary Orenstein
Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won. In this episode, Gianna and Maria sit down with Gary Orenstein, the Chief Customer Officer at Bitwarden, to break down how an open-source password manager with a “free forever” product became a trusted global brand across consumers and enterprises. No gimmicks. No fear-mongering. Just a strategy built on transparency, trust, and a product that actually works.
Marketing
13 hours ago
Free Forever, No BS: Inside Bitwarden’s Growth Playbook with Gary Orenstein
Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won. In this episode, Gianna and Maria sit down with Gary Orenstein, the Chief Customer Officer at Bitwarden, to break down how an open-source password manager with a “free forever” product became a trusted global brand across consumers and enterprises. No gimmicks. No fear-mongering. Just a strategy built on transparency, trust, and a product that actually works.
Marketing
Cybersecurity News
Business
Just Now
US DOJ opens antitrust review of Google's Wiz acquisition.
Bitdefender to acquire Mesh Security.
Daily Briefing
4 hours ago
Viasat identified as a victim of Salt Typhoon hacks.
Pro-Israel hackers take credit for attack on Iranian bank. Veeam patches critical flaw affecting backup servers.
Threat Vector
14 hours ago
Cut the Noise, Ditch the Nonsense, Earn the Trust
In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry.
CyberWire Daily
Jun 17, 2025
Can’t DOGE the inquiry.
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s Kimsuky targets academic institutions using password-protected research documents. Asus patches a high-severity vulnerability in its Armoury Crate software. CISA’s new leader remains in confirmation limbo. Our guest is Brian Downey, VP of Product Management from Barracuda, talking about how security sprawl increases risk. Operation Fluffy Narwhal thinks it’s time to rethink adversary naming.
Daily Briefing
Jun 17, 2025
Scattered Spider shifts targeting to the US insurance sector.
Water Curse distributes malware via weaponized GitHub repositories. United Natural Foods continues recovery from cyberattack.
Afternoon Cyber Tea
Jun 17, 2025
The Human Firewall: People-First Cybersecurity
Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and human-centered leadership. She talks about what separates good and great leaders during the first hours of an incident response and why delayed action equals exponential damage. She also spotlights her work with BlackGirlsHack, a rapidly growing nonprofit that opens doors for underrepresented talent in cyber, and makes the case that building an inclusive security workforce isn’t just the right thing to do, it’s the smart thing to do.
CSO Perspectives
Jun 17, 2025
Strategic approaches to talent: A practical guide.
Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings. In this episode of CISO Perspectives, host Kim Jones sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.
story
Jun 17, 2025
How do we address talent strategically?
When hiring new employees, organizations often struggle with how to strategically acquire cyber talent in ways that truly strengthen their teams and overall security posture.
CyberWire Daily
Jun 16, 2025
Darknet drug marketplace closed for business.
International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it’s no laughing Meta.
Daily Briefing
Jun 16, 2025
Hackers compromise Washington Post email accounts.
WestJet investigates cybersecurity incident. Google attributes last week's outage to API management bug.
Research Saturday
Jun 14, 2025
Hiding in plain sight with vibe coding.
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats. The team at Pillar Security identified a novel attack vector, the "Rules File Backdoor", which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools.
Week that Was
Jun 14, 2025
Spyware industry news. Patch Tuesday notes.
UK calls for blood donors following last year's cyberattack. United Natural Foods disrupted by cyberattack. Trump Administration amends cybersecurity policies.
Load More
Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.
Subscribe Now