Two Cryptocurrency Exchanges were recently taken down by authorities. The PM2BTC and Cryptex sites were seized.Video: https://youtube.com/shorts/wvRelrVSOcE This is important for two reasons:1. It disrupts illegal money laundering, in this case,…
Ransomware is one of the most devastating challenges in cybersecurity today. The attacks are vicious, expensive, impactful, and becoming commonplace.Over the years I have predicted its rise, discussed why it is so challenging, debunked myths like…
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing short of epic! Forget long boring sessions and tracks, this was about…
The expectations of CISOs are rising and their influence must resonate with C-Suite and Boardroom audiences. I am excited at moderating a panel at the upcoming HMGStrategy 16th Annual Silicon Valley C-Level Technology Leadership Summit on Oct 8th…
I had a great discussion on the SECURITYbreak podcast talking about security vulnerability research impacting Apple vision pro VR headsets, MasterCard’s acquisition of threat intelligence vendor Recorded Future, and some horrific aspects of…
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine.As a California resident, I have the legal right to demand that…
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead of…
Conveying the risks and progress for a cybersecurity program to executives is difficult. Over the years, I have explored countless ways to quickly and effectively distill the complexities of cyber risk into a simple graphic that informs management…
I am looking forward to speaking at the CISO/Executive Leadership Forum this October 24th-25th in Napa California! This will be such a stellar event and great opportunity to network with amazing leaders.Check out more details at:…
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports,…
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear responsibility to protect the business and the…
The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretation of ambiguous laws. The ramifications will have…
California’s Department of Motor Vehicles will implement a blockchain to prevent vehicle title fraud. They will use Ava Labs’s Avalanche blockchain to allow over 39 million residents to claim and access their vehicle titles. The online service is…
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure…