Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage. Critical Infrastructures are a favorite of aggressive Nation State cyber threats. In addition to…
Join me on Thursday May 1st, 11am PT as a guest with Defendify on a live webinar where I’ll discuss practical cybersecurity leadership for IT teams!Communicating cyber risk in business terms to secure support and resourcesImportance of planning and…
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:1. Ended up on a cybercriminal call-list because of a Data…
Geopolitical Warfare is driving change and adaptation across the globe. Nation States are seeking innovative methods to pursue their foreign policy agendas. They are blending tradition kinetic methods with social and cyber tools that greatly…
Privacy risks and demands will continue to rise in our AI powered world, as AI systems hunger for access to data and create content that may undermine privacy principles! Privacy leaders have a tough job ahead - balancing the need for more…
I am very glad that the Common Vulnerabilities and Exposures (CVE) program was re-funded by the US Government, specifically CISA (Cybersecurity and Infrastructure Security Agency), but this last-minute catch has raised serious concerns with the…
CISOs Under Siege: Navigating Escalating Cyber Threats, AI Disruption, and the Boardroom Divide in 2025. These are some of my favorite topics! I will be speaking on the HMG Strategy - Global Viewpoint podcast, with Hunter Muller, Founder and CEO of…
The recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that even the most capable cybersecurity tools and well-defined policies can be rendered meaningless if ignored or…
More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via web…
Cyber Crime Junkies podcastBreaking Down Risks in Cybersecurity — A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with:· Generative vs Agentic AI risks and…
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from simple tactics like…
Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not…
The recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and could represent a cybersecurity risk. Its reveal by security researchers has kicked off an interesting…
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books or manage…