The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam.Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the cybersecurity industry has traditionally focused on the…
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may…
I was recently asked “What do intelligence reports do? They appear worthless!”I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.There is a fundamental difference between intelligence and the…
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry! See the full list of profiles here:…
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design…
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicated to delivering accurate, timely, and valuable…
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the…
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some very…
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!Never underestimate the creativity and resourcefulness of intelligent adversaries in finding ways to leverage technology for…
The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly…
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries.A top US national cybersecurity advisor stated in a recent op-ed, “This is a troubling practice that must…
The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast! Reality of Cybersecurity Risks for AI — Ejona Preci Cybersecurity is Adversarial — Our Failures are…
Secureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are fraudulently obtaining positions so they can victimize the employer!I predict we will see more of these types of…