I have a busy week with podcasts, webinars, and a keynote! Communicating and sharing is vital to the cybersecurity industry. It is how we leverage shared knowledge and experiences to make more informed decisions and gain better positions against our
Blog (975)
Summary: Why Agentic AI Is the Real AI Breakthrough
2025 has been the year for the buzzword “AI”, and now 2026 is leading the way for “Agentic AI” - a notch up from AI. Start slow, develop gradually, build the best skillset by the end of 1st half of 2
Now hosted by Defense Strategies Institute, the Insider Risk Summit West has been known for its unique platform where private and public sec
I am really excited to talk about how AI is going to turn cybersecurity upside down in 2026 with the Nemertes community in a virtual webinar on Feb 18th at 2pm Pacific. This will be an open discussion with these science and technology luminaries!
I
The recent attack against the Polish power grid has been attributed to ELECTRUM, a Russian state-sponsored cyber group. That hack sought to disable communications and control units in Industrial Control Systems of heat and power systems.
Aggressive Na
Finding trustworthy cybersecurity partners and services is challenging! That is why I am partnering with Clutch and its community to curate a list of providers that have built authentic reputations supported by verified customer ratings and comments!
I really hope this catches on!
Firefox is making a bold move to include an easy option to block AI enhancements in their browser! The respected browser company recognizes the backlash coming from security and privacy issues with AI.
Beginning on Feb 24
Setting the Stage: Understanding Regional Search Dynamics
City-level SEO is a different animal. You’re not competing in the endless desert of national keywords; you’re jockeying for attention in a crowded local marketplace where relevance and proximit
A great example of how uninformed leaders (in this case of cybersecurity) who does not understand the assignment and leaks sensitive data via an AI chat tool.
Even though the US Cybersecurity and Infrastructure Security Agency has a policy that forbid
In 2026, your data is either your greatest asset or your biggest legal debt. There is no middle ground.
Technology is moving faster than ever, the old rules for protecting data simply don’t work anymore.
This Data Privacy Week, we invited five industry
Does this process flow look familiar? It is the compounding failure due to an absence of cybersecurity fundamentals.
When innovation plows forward without the benefit of cybersecurity, there will eventually be tears, finger pointing, denial, and loss.
This Week’s Pick by David B. Cross (CISO, Atlassian)
This is smart: a financial sector CISO recognizes the inherent risks of MCPs, that are used by agentic AIs, and role-plays the attackers to find vulnerabilities to protect the overall environment! Focusing red and purple team investments to areas tha
198 thousand LinkedIn followers! That is truly amazing. I am humbled and honored to be a part of such an incredible community! Thank you everyone.
My goal is to make digital technology trustworthy. To that end, I share ideas and innovation, foster com
Cybersecurity and digital identity march towards an intersection.
The age-old approach of cybersecurity has been to defend networks, devices, and applications against external threats. Enterprise defense strategies have always been based on firewalls,
In 2026 two classes of threat actors will rise in the overall impact rankings: Data Harvester and Vulnerability Researcher. AI tools will benefit them greatly in their pursuits, which will have a cascading impact on the types of attacks and damage ca
This Week’s Pick by David B. Cross (CISO, Atlassian)
The cybersecurity landscape has evolved dramatically. A decade ago cybercrime was a costly nuisance; today it is a national‑security threat and a billion‑dollar industry in its own right. The stakes are especially high for enterprises, small and medi
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
