Top50 Global Thought Leaders on Privacy 2025Privacy risks and demands will continue to rise in our AI powered world, as AI systems hunger for access to data and create content that…3d ago3d ago
Last Minute Save for the CVE ProgramBut trust has been lost across the cybersecurity community3d ago3d ago
Simplifying Cyber Safety for Everyone with Sandra EstokThe Cybersecurity Vault — episode 45, with guest Sandra Estok.Apr 9Apr 9
Navigating Cyber Threats, AI Disruption, and Boardroom DivideCISOs Under Siege: Navigating Escalating Cyber Threats, AI Disruption, and the Boardroom Divide in 2025. These are some of my favorite…Apr 1Apr 1
Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military PlansThe recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that…Mar 31Mar 31
Advanced Malware Targets Cryptocurrency WalletsMore attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated…Mar 25Mar 25
Immutable Cybersecurity Law #12“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Mar 172Mar 172
Boards Challenged to Embrace Cybersecurity OversightIntegrating Cyber Risk into Business Risk DecisionsMar 14Mar 14
Are They Vulnerabilities or Undocumented Debug FeaturesThe recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and…Mar 11Mar 11