
Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans
The recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that even the most capable cybersecurity tools and well-defined policies can be rendered meaningless if ignored or misused.In this case, senior leaders relied on the Signal messaging app to communicate ... Read More

Advanced Malware Targets Cryptocurrency Wallets
More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via web browsers. The malware targets many widely used cryptocurrency wallet browser extensions:1. Bitget Wallet (Formerly BitKeep)2. Trust Wallet3. TronLink4. ... Read More

Breaking Down Risks in Cybersecurity
Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity – A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with: Generative vs Agentic AI risks and opportunities How cyber ... Read More

Immutable Cybersecurity Law #12
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from simple tactics like phishing emails, social engineering, and exploiting basic security misconfigurations. Complexity isn’t a prerequisite for effectiveness — attackers ... Read More

Boards Challenged to Embrace Cybersecurity Oversight
Integrating Cyber Risk into Business Risk DecisionsCybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not incorporated into the strategic management of the most senior business leadership ... Read More

Ransomware Attack Ends a 150 Year Company
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology - even if it is to run your books or manage your logistics. Failures in cybersecurity ... Read More

The CISO Transformation – A Path to Business Leadership
The Chief Information Security Officer (CISO) position is on the precipice of transformation! The CISO role has dramatically changed over the years as the demands have significantly grown and expanded, elevating what was once a support function buried in IT to a high-profile role that regularly provides reports and updates ... Read More

Microsoft Introduces a New Architecture for Quantum Computers
The world is abuzz with Microsoft’s announcement today of the introduction of their Majorana 1 chip. It could represent a series of important breakthroughs in producing powerful quantum computers. The chip represents a radically different architecture that could be very stable and scalable, potentially enabling millions of qubits on ... Read More

Cybersecurity Rant – Senselessly Repeating Mistakes
We often complain how tough cybersecurity is, yet we often make the same mistakes again and again. It’s true, cybersecurity is an unforgiving underdog of a situation that is complex, relentless, incredibly difficult to overcome, and often thankless. But we are not doing ourselves any favors by rinsing and repeating ... Read More

Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA
For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that system and service availability attacks were coming too. They didn’t care — until they were hit, and hospitals could no ... Read More