The Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling RiskMicrosoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into…Nov 28Nov 28
Is Cyber Threat Intelligence Worthless?I was recently asked “What do intelligence reports do? They appear worthless!”Nov 23Nov 23
2024 Top 50 Thought Leaders on Risk ManagementCongrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!Nov 21Nov 21
Fraudsters Abuse DocuSign API for Legit-Looking InvoicesI didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they…Nov 12Nov 12
Joining The Cyber Express Advisory BoardI’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate…Nov 11Nov 11
Perfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently…Nov 8Nov 8
Highlights from the InCyber Montreal ForumI had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!Nov 7Nov 7
Do CISOs Smile?How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose…Nov 4Nov 4
Malware Can Hide From Email Scanners in Virtual Hard DrivesThis is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!Oct 24Oct 24