Key Cybersecurity Challenges In 2025—Trends and Observations
by Chuck Brooks
In 2025, cybersecurity is gaining significant momentum. However, there are still many challenges to address. The ecosystem remains unstable in spite of investme
by Chuck Brooks
In 2025, cybersecurity is gaining significant momentum. However, there are still many challenges to address. The ecosystem remains unstable in spite of investme
Agentic Artificial Intelligence (AI) (What Is Agentic AI?) is becoming a powerful force in cybersecurity and modern warfare. These AI systems consist of autonomous agents with minimal human oversight. They perceive, decide, and act independently to a
The PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:
In December 2024, PowerSchool was breached by ransomware attackers who claimed to have copied 62 million records, a f
Misuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in ways not likely understood by the users. Microsoft wants people to connect their personal OneDrive file share wit
Recovering from a cyber attack can be costly
Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack. If you’re thinking about cyber insurance, discuss with your insurance agent what policy would
Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage.
Critical Infrastructures are a favorite of aggressive Nation State cyber threats. In addition to communi
MIT - AI Risk Repository (April 2025 Update)
This month, 9 new documents have been added to their AI Governance Repository. Published between 2024–2025, these include a mix of government reports, industry papers, and preprints covering:
a)Generative
CIS guide on "The Cost of Cyber Defense: Implementation Group 1 (IG1)," designed to address key questions, including:
Nations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In 2025, the De
The digital realm has permeated every facet of modern life, leaving an indelible mark on the legal landscape. Electronic evidence, encompassing emails, messages, social media posts, and digital documents, has become a cornerstone in legal proceedings
This case, adjudicated under the Information Technology Act, 2000, involves a significant breach of cybersecurity and financial fraud. The Complainant, Dhule Vikas Sahakari Bank Ltd. (DVSB), a cooperative bank, alleg
Join me on Thursday May 1st, 11am PT as a guest with Defendify on a live webinar where I’ll discuss practical cybersecurity leadership for IT teams!
Communicating cyber risk in business terms to secure support and resources
Importance of planning and p
Cybersecurity empowers businesses to soar, this is how. The modern day notion that “cybersecurity is a business enabler” is a very popular one. The problem is that most of the people singing that tune are cybersecurity leaders trying to get their mes
In today’s fast-paced healthcare environment, efficiency, accuracy, and speed are more important than ever. One critical area where many healthcare providers face bottlenecks is the prior authorization process. Prior authorization, or prior auth, is
We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman)) and Erik Laird (Vic
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase!
I rarely give out the number so I assume one of the following:
1. Ended up on a cybercriminal call-list because of a Data Bre
We had a community fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) & Erik Laird (Vice President - North America, FireCompass), where we delv
Cybersecurity professionals have long relied on vulnerability databases and CWE lists, but NIST's Bugs Framework (BF) brings a refreshing formalism and extensibility to the field. Developed by Irena Bojanova and detailed in NIST Special Publication 8
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …