Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans

Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans

 The recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that even the most capable cybersecurity tools and well-defined policies can be rendered meaningless if ignored or misused.In this case, senior leaders relied on the Signal messaging app to communicate ... Read More
Advanced Malware Targets Cryptocurrency Wallets

Advanced Malware Targets Cryptocurrency Wallets

 More attacks targeting cryptocurrency users.  Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via web browsers. The malware targets many widely used cryptocurrency wallet browser extensions:1.        Bitget Wallet (Formerly BitKeep)2.        Trust Wallet3.        TronLink4.        ... Read More
Double Edged Sword 🎯 AI Risks to Small Business

Breaking Down Risks in Cybersecurity

 Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity – A great conversation on the Cyber Crime Junkies podcast with David Mauro!  We covered so many different topics that the CISOs are struggling with:          Generative vs Agentic AI risks and opportunities         How cyber ... Read More
Immutable Cybersecurity Law #12

Immutable Cybersecurity Law #12

 “Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from simple tactics like phishing emails, social engineering, and exploiting basic security misconfigurations. Complexity isn’t a prerequisite for effectiveness — attackers ... Read More
Boards Challenged to Embrace Cybersecurity Oversight

Boards Challenged to Embrace Cybersecurity Oversight

Integrating Cyber Risk into Business Risk DecisionsCybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not incorporated into the strategic management of the most senior business leadership ... Read More
Ransomware Attack Ends a 150 Year Company

Ransomware Attack Ends a 150 Year Company

 Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books or manage your logistics. Failures in cybersecurity ... Read More
The CISO Transformation – A Path to Business Leadership

The CISO Transformation – A Path to Business Leadership

 The Chief Information Security Officer (CISO) position is on the precipice of transformation! The CISO role has dramatically changed over the years as the demands have significantly grown and expanded, elevating what was once a support function buried in IT to a high-profile role that regularly provides reports and updates ... Read More
Microsoft Introduces a New Architecture for Quantum Computers

Microsoft Introduces a New Architecture for Quantum Computers

 The world is abuzz with Microsoft’s announcement today of the introduction of their Majorana 1 chip.  It could represent a series of important breakthroughs in producing powerful quantum computers.   The chip represents a radically different architecture that could be very stable and scalable, potentially enabling millions of qubits on ... Read More
Cybersecurity Rant - Senselessly Repeating Mistakes

Cybersecurity Rant – Senselessly Repeating Mistakes

 We often complain how tough cybersecurity is, yet we often make the same mistakes again and again.  It’s true, cybersecurity is an unforgiving underdog of a situation that is complex, relentless, incredibly difficult to overcome, and often thankless.  But we are not doing ourselves any favors by rinsing and repeating ... Read More
Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA

 For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that system and service availability attacks were coming too. They didn’t care — until they were hit, and hospitals could no ... Read More