Cybersecurity meets circularity