Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
May 20, 2025
Join Pro
LOGIN
14 hours ago
Do certifications matter?
As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host Kim Jones sits down with N2K's own, Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.
CSO Perspectives
14 hours ago
Do certifications matter?
As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host Kim Jones sits down with N2K's own, Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.
CSO Perspectives
Cybersecurity News
CyberWire Daily
Just Now
The Take It Down Act walks a fine line.
President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA has added six actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 DBIR. DOGE downsizes, and the UAE recruits.
Daily Briefing
4 hours ago
President Trump signs the Take It Down Act into law.
Arla Foods says cyberattack affected production operations. Another ransomware attack disrupts the UK grocery sector.
Afternoon Cyber Tea
13 hours ago
Hugh Thompson on Building the RSA Conference
Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve. Hugh also shares how his background in applied math led him from academia to cybersecurity, his thoughts on the human element in security, and what keeps him optimistic about the future of the industry.
CSO Perspectives
14 hours ago
Do certifications matter?
A constant question in cybersecurity revolves around the value of certifications. However, despite the criticisms of many certifications, there is evidence that not only supports their value to the individual but to organizations.
CyberWire Daily
May 19, 2025
Redacted realities: Inside the MoJ hack.
The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows systems. An Alabama man gets 14 months in prison for a sim-swap attack on the SEC. Our guest is Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration. Ethical Hackers win the day at Pwn2Own Berlin.
story
May 19, 2025
Enhancing cybersecurity through effective collaboration with Ian Tien, Mattermost.
Ian Tien, CEO of Mattermost, joins Dave Bitter on the CyberWire Daily podcast for a sponsored Industry Voices conversation recorded at RSAC 2025. They discuss how the company is pioneering a new category of mission-critical collaboration platforms designed for defense, government, and critical infrastructure—going beyond the casual use cases of Slack and Teams.
Daily Briefing
May 19, 2025
UK’s Ministry of Justice discloses major breach.
Healthcare data breaches affect hundreds of thousands. SEC X account hacker sentenced to fourteen months in prison.
Research Saturday
May 17, 2025
Leveling up their credential phishing tactics.
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.
Week that Was
May 17, 2025
Coinbase offers $20 million bounty for arrest of extortionists.
US steel manufacturer hit by cyberattack. Marks and Spencer confirms customer data was stolen during cyberattack. Co-op continues recovery from cyberattack.
story
May 16, 2025
The battlespace of the future is here with Christopher Cleary, ManTech
Christopher Cleary, Vice President of Global Cyber Practice at ManTech, joins Dave Bittner, host of the CyberWire Daily podcast, for a sponsored Industry Voices conversation recorded at RSAC 2025. They explore the escalating cyber threats facing the U.S., highlighting the vulnerabilities in critical infrastructure, the sophisticated tactics of foreign adversaries, and the urgent need for greater public-private coordination.
CyberWire Daily
May 16, 2025
Preparing for the cyber battlespace.
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcos RAT. The NSA’s Director of Cybersecurity hangs up their hat. Our guest is Christopher Cleary, VP of ManTech's Global Cyber Practice, discussing the cyber battlespace of the future. Coinbase flips the script on an extortion attempt.
Daily Briefing
May 16, 2025
Co-op continues recovery from cyberattack.
US DOJ charges twelve more suspects in theft of $263 million in cryptocurrency. APT28 exploits webmail vulnerabilities to target government agencies.
Load More
Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.
Subscribe Now