The Cybersecurity Vault - episode 39, with guest Ian Thornton-Trump. China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can undermine security and privacy.Does this sound…
The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions.Anyone can make predictions (and far too many do),…
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam.Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the cybersecurity industry has traditionally focused on the…
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may…
I was recently asked “What do intelligence reports do? They appear worthless!”I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.There is a fundamental difference between intelligence and the…
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry! See the full list of profiles here:…
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design…
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicated to delivering accurate, timely, and valuable…
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the…
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some very…
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!Never underestimate the creativity and resourcefulness of intelligent adversaries in finding ways to leverage technology for…
The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly…
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries.A top US national cybersecurity advisor stated in a recent op-ed, “This is a troubling practice that must…
The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast! Reality of Cybersecurity Risks for AI — Ejona Preci Cybersecurity is Adversarial — Our Failures are…