The Cybersecurity Vault - episode 41, with guest Dan Lohrmann.2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!In…
The Cybersecurity Vault — episode 40, with guest Sumona BanerjiAttackers are masterful at using Social Engineering techniques to victimize others. They take advantage of vulnerabilities that are deeply rooted in our mental and emotional foundations.…
The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into 2025, strategies for managing increasing…
I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers.This is an incredible list of influencers who have attracted the attention of business professionals with their…
The Cybersecurity Vault - episode 39, with guest Ian Thornton-Trump. China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can undermine security and privacy.Does this sound…
The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions.Anyone can make predictions (and far too many do),…
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam.Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the cybersecurity industry has traditionally focused on the…
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may…
I was recently asked “What do intelligence reports do? They appear worthless!”I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.There is a fundamental difference between intelligence and the…
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry! See the full list of profiles here:…
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design…
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicated to delivering accurate, timely, and valuable…
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the…