Navigating Cyber Threats, AI Disruption, and Boardroom DivideCISOs Under Siege: Navigating Escalating Cyber Threats, AI Disruption, and the Boardroom Divide in 2025. These are some of my favorite…5d ago5d ago
Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military PlansThe recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that…6d ago6d ago
Advanced Malware Targets Cryptocurrency WalletsMore attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated…Mar 25Mar 25
Immutable Cybersecurity Law #12“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Mar 172Mar 172
Boards Challenged to Embrace Cybersecurity OversightIntegrating Cyber Risk into Business Risk DecisionsMar 14Mar 14
Are They Vulnerabilities or Undocumented Debug FeaturesThe recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and…Mar 11Mar 11
The CISO Transformation — A Path to Business LeadershipFrom Risk Hero to Business SuperheroFeb 25Feb 25
Cybersecurity Must Reinvent or Fall BehindCybersecurity must reinvent itself or fall behind! Rinki Sethi, VP & CISO, talks about how AI is driving adaptation and discusses how…Feb 24Feb 24