One of the ‘most influential cybersecurity’ roles will pay under $175,000

A job posting by the UK's GCHQ for a Chief Information Security Officer, described as a highly influential role, offers a maximum salary of £130,000 (approximately $175,000). This salary is considered low compared to industry standards for similar positions, especially considering the responsibilities involved in securing a nation from cyber threats.

The CSO guide to top security conferences

This article is a guide to upcoming security conferences in 2026, offering a list of events that cover various aspects of cybersecurity. It aims to help cybersecurity professionals stay informed about industry trends and threats by attending these conferences for networking and knowledge gathering.

Marquis v. SonicWall Lawsuit Ups the Breach Blame Game

A FinTech company is suing SonicWall after suffering a breach, raising questions about the responsibility of third-party security vendors when their products fail to prevent attacks. The lawsuit highlights the complex issue of liability in cybersecurity incidents involving multiple parties.

Apple iPhone and iPad Cleared for Classified NATO Use

Apple's iPhones and iPads have been cleared for classified use by NATO. These devices have been added to the NATO Information Assurance Product Catalogue (NIAPC), indicating they meet the security requirements for handling classified information within the alliance.

Four Risks Boards Cannot Treat as Background Noise

This SecurityWeek article discusses four cybersecurity risks that boards of directors should prioritize and not ignore. The emphasis is on business continuity and resilience in the face of inevitable successful attacks, rather than focusing solely on prevention.

Gambit Security Emerges From Stealth With $61 Million in Funding

Gambit Security, a cybersecurity startup, has emerged from stealth mode with $61 million in seed and Series A funding. The company plans to use the investment to accelerate product development and expand its sales and customer success teams.

The farmers and the mercenaries: Rethinking the ‘human layer’ in security

The article discusses the common cybersecurity practice of relying on employees as the 'last line of defense' and argues that it's unrealistic to expect untrained employees to catch threats that sophisticated security tools and professionals miss. The author suggests this approach leads to high false-positive rates and overwhelmed SOC teams, as employees flag normal business operations as potential risks.

5 trends that should top CISO’s RSA 2026 agendas

The article discusses five cybersecurity trends expected to be prominent at RSA 2026, focusing on the rise of AI-SOCs and the importance of Continuous Threat Exposure Management (CTEM). It also touches on the increasing focus on the software supply chain, the evolving role of zero trust architecture, and the imperative of cybersecurity frameworks.

How to Justify Your Security Investments [DE]

The article discusses how CISOs can justify security investments to boards of directors. It emphasizes the importance of framing security spending in terms of revenue generation, risk mitigation, and shareholder value, rather than simply as technical upgrades. The article also advises CISOs to link technology investments to strategic priorities, such as entering new markets, improving margins, increasing resilience, and ensuring compliance.

Sophos Workspace Protection is Now Available

Sophos has announced the release of Sophos Workspace Protection, a new product offering. The article highlights the availability of this new protection solution for workspaces.

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

The article discusses how poorly implemented security triage processes can increase business risk instead of reducing it. It highlights issues such as indecisiveness, alert fatigue, and escalation leading to missed SLAs and real threats slipping through the cracks.

Astelia Raises $35 Million for Exposure Management

Astelia, a company focused on exposure management, has raised $35 million in funding. The company intends to use the funds to expand its AI-based analysis capabilities, increase its workforce, and scale deployments.

Boards don’t need cyber metrics — they need risk signals

The article discusses the disconnect between the cybersecurity metrics that security teams track and the risk signals that boards of directors need to effectively govern risk. It argues that boards are less interested in technical metrics like "mean time to detect" and more interested in metrics that directly map to financial consequences, regulatory exposure, and operational disruption. Experts suggest focusing on metrics like detection and containment speed, which function as proxies for business loss avoided.

Sophos Workspace Protection is Now Available

Sophos has launched Sophos Workspace Protection, a new offering designed to provide comprehensive security for modern work environments. This solution integrates endpoint protection, threat detection, and response capabilities to safeguard against evolving cyber threats.

As Cybersecurity Firms Chase AI, VC Market Skyrockets

Cybersecurity startup investments surged in 2025, driven by venture capital firms prioritizing AI-native technologies and skilled personnel. This trend indicates a growing emphasis on AI's role in cybersecurity and the need for specialized expertise.

Celebrating Two Years of CSF 2.0!

The NIST Cybersecurity Framework (CSF) 2.0 is celebrating its second anniversary. Published in 2024, CSF 2.0 included an updated framework with an added Govern Function, emphasizes supply chain risk management, and new categories/subcategories addressing current threat and technology shifts.

It’s time to rethink CISO reporting lines

The article discusses the reporting structure of CISOs, highlighting that a majority still report to IT, specifically the CIO or CTO. Experts argue that this structure can create a conflict of interest, as the CIO is incentivized to cut costs, while the CISO is responsible for identifying risks that require spending, and suggests that CISOs should ideally report to the CEO or general counsel.

Break free of Ring's servers, earn a five-figure bounty

Ring is offering a $10,000 bounty for security researchers who can find flaws that allow users to run software locally and stream only to their own computers, breaking free of Ring's servers. This initiative aims to address ongoing privacy and security concerns surrounding Ring's products.

Friday Squid Blogging: Squid Cartoon

This is a weekly "Friday Squid Blogging" post on Bruce Schneier's blog. The post includes a link to a squid cartoon and invites readers to discuss security news stories not covered on the blog.

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

The article discusses the increasing importance of "identity cyber scores" in cyber insurance assessments, driven by the high frequency of attacks involving compromised employee accounts. Insurers and regulators are focusing on elements like password hygiene, privileged access management, and MFA coverage to gauge cyber risk.

Ukrainian gets 5 years for helping North Koreans infiltrate US firms

A Ukrainian man was sentenced to five years in prison for assisting North Korean IT workers in using stolen identities to gain employment at U.S. firms. This scheme allowed the North Koreans to generate revenue for their government while posing as legitimate employees.

10 Passwordless Options for Businesses [DE]

The article discusses the problem of password-based authentication and its susceptibility to cyberattacks. It introduces passwordless authentication as a solution, highlighting the FIDO Alliance and technologies like FIDO2 and Passkeys as key components. The article then lists 10 passwordless authentication solutions for companies.

DEF CON bans three Epstein-linked men from future events

DEF CON has banned three men named in the Epstein files from attending future events. These individuals are not accused of any criminal wrongdoing, but internal communications showed discussions of networking and business interests with Jeffrey Epstein throughout the 2010s.

Cybersecurity needs maturity and not checklists [DE]

The article discusses the immaturity of cybersecurity practices in many organizations, where compliance checklists and superficial activities are prioritized over genuine risk reduction and resilience. It emphasizes that cybersecurity is not a game, but a serious matter requiring mature leadership, long-term thinking, and clear responsibilities to avoid creating a false sense of security.

From in-house CISO to consultant. What you need to know before making the leap

The article discusses the trend of CISOs transitioning from in-house roles to consulting, highlighting the benefits such as increased flexibility, learning opportunities, and the ability to impact multiple organizations. It also covers the challenges and necessary adjustments, such as the shift from mandating to influencing.

Threat Intelligence: Will AI Make Human Analysts Obsolete?

The article discusses the role of AI in threat intelligence and whether it will replace human analysts. It argues that AI is a force multiplier, not a replacement, and that effective human-machine collaboration is key to creating adaptive and proactive defense capabilities. The article suggests that human context, ethics, and intuition remain indispensable in threat intelligence.

Driving Security Culture Evolution for Business Growth

The article discusses the importance of evolving security culture within organizations to shift security teams from being seen as roadblocks to becoming strategic enablers of business growth. It emphasizes the need for collaboration, communication, and embedding security into the organizational culture. The article highlights how intentional leadership can position security as a cornerstone of innovation and operational success.

Discipline is the new power move in cybersecurity leadership

The article discusses a shift in cybersecurity leadership towards financial efficiency and capital allocation, driven by budget constraints. It emphasizes the need for CISOs to prioritize actions that materially reduce risk exposure while being financially disciplined, moving away from simply adding more tools and teams.

The new paradigm for raising up secure software engineers

The increasing use of AI coding assistants is accelerating software development, creating challenges for security teams due to the increased volume and speed of code production. Traditional developer security training needs to evolve from focusing on common code-level vulnerabilities to emphasizing threat modeling and systemic software risks, with training being bite-sized, hands-on, and embedded in developer toolchains.

Palo Alto CEO says AI isn’t great for business, yet

Palo Alto Networks CEO Nikesh Arora believes enterprise AI adoption is lagging, except for coding assistants. The company acquired Koi to prepare for future AI developments in the enterprise space, suggesting they expect broader adoption eventually.

VulnCheck Raises $25 Million in Series B Funding to Scale Vulnerability Intelligence

VulnCheck, a vulnerability intelligence firm, has raised $25 million in Series B funding led by Sorenson Capital, bringing total investment to $45 million. This funding will be used to scale their vulnerability intelligence capabilities. The company likely provides services related to vulnerability research, exploit analysis, or related security data.

With CISOs stretched thin, re-envisioning enterprise risk may be the only fix

A recent report indicates that over half of CISOs feel their roles are no longer manageable due to consistently broadened responsibilities without adequate resources. This scope-resource imbalance can lead to delays in strategic priorities, erosion of long-term resilience, and reactive security operations. CISOs are now often responsible for business risk functions and even parts of the IT stack.

Finding a common language around risk

The article discusses the problem of fragmented risk management within organizations, where different departments (cybersecurity, operations, and strategy) use different 'languages' to describe and address risk. This siloed approach can lead to a lack of comprehensive understanding and coordination, ultimately harming the organization, similar to the Enron collapse.

Upcoming Speaking Engagements

Bruce Schneier has announced his upcoming speaking engagements for 2026. He will be speaking at events in Canada, the US, and the UK, covering topics related to AI and cybersecurity.

Friday Squid Blogging: Do Squid Dream?

This blog post from Schneier on Security links to an article exploring the question of whether squid dream. The linked article discusses scientific perspectives on cephalopod sleep.