A Digital Tidal Wave, Hidden Payloads, Another One Bites the Dust, Unexpected Withdrawals, Spelling Bee Fail, and "Halt: Who Goes There?" It's CISO Intelligence for Wednesday, 24th September 2025.

When really hard rain falls, check and check again, unexpected deliveries in a cunning disguise, the satisfaction of netting a satisfying haul, the "it's not you it's me" letdown, and securing all entries.

A Digital Tidal Wave, Hidden Payloads, Another One Bites the Dust, Unexpected Withdrawals, Spelling Bee Fail, and "Halt: Who Goes There?" It's CISO Intelligence for Wednesday, 24th September 2025.
Photo by Silas Baisch / Unsplash
😇
CISO Intelligence has dropped its paywall for a limited time. Take advantage of our library of content, and enjoy the newsletter!

Table of Contents

  1. When Bots Attack: The Rise of the 22.2 Tbps Tsunami
  2. NPM Packages: QR Codes Gone Rogue?
  3. Crypto Crooks Get the Boot: Inside the €100M Crackdown
  4. Kiss and MITRE-Up: A Cybersecurity Drama Unfolds
  5. Typosquatting: The Art of Misspelling for Malicious Mischief
  6. Streamlining Identity Governance: Unlocking the Password Pains

When Bots Attack: The Rise of the 22.2 Tbps Tsunami

When it rains bots, it monsoons packets!

What You Need to Know

The cybersecurity landscape has been rocked by a Distributed Denial-of-Service (DDoS) attack that peaked at a staggering 22.2 terabits per second (Tbps), marking a significant new high in attack volume. Executives must urgently evaluate their current DDoS defense capabilities, ensuring they have the necessary automated technologies in place to combat future hyper-volumetric attacks. There is an immediate need to assess whether your organization's security provider is equipped to handle such rapidly escalating threats.

CISO Focus: DDoS Mitigation
Sentiment: Strong Positive - for Adoption of Advanced Defensive Technologies
Time to Impact: Immediate


An Internet Earthquake in 40 Seconds

In what can only be described as a cataclysmic event for cybersecurity professionals, a new world record in DDoS attacks has been set. The assault, peaking at 22.2 Tbps and delivering 10.6 billion packets per second, represents more than just numbers; it is a dire warning of the evolving capabilities of cybercriminals. Lasting a mere 40 seconds, the attack wielded overwhelming force to create maximum chaos before defenses could even blink.

The Mechanism Behind the Madness

These "hit-and-run" tactics are a stark reminder of the ingenuity and adaptability of malicious actors. Their ability to unleash such unprecedented volume within an exceedingly short timespan pushes security mechanisms to the edge. Legacy systems that rely on manual intervention, such as DDoS "scrubbing" centers, are shown to be inadequately slow and cumbersome.

Automation: An Indispensable Shield

This attack was, however, a litmus test passed with flying colors by Cloudflare’s automated defense systems. Without human touch, the infrastructure responded instantaneously, showcasing the importance of machine learning and AI-driven threat detection. This incident underscores the essential shift towards automation as attacks accelerate to machine speeds.


The Immediate Questions Facing Businesses

In wake of the 22.2 Tbps assault, businesses globally should be prompted to reevaluate their cybersecurity postures. The critical inquiry remains: does your security architecture possess the resilience and automation capabilities necessary to withstand such assaults?

  • Infrastructure Readiness: Can your network provider sustain and mitigate hyper-volumetric onslaughts?
  • Technology Integration: Is your cybersecurity framework enhanced with real-time, machine-learning-capable solutions?
  • Response Protocols: How efficient is your incident response in activating against sub-minute attacks?

Vendor Diligence Questions

  1. Does the vendor's solution offer machine-learning capabilities to autonomously detect and mitigate DDoS attacks?
  2. What volumetric capacity can the vendor's infrastructure handle simultaneously?
  3. How does the vendor facilitate immediate alerting and response process in the event of hyper-volumetric attacks?

Action Plan

  1. Evaluate Current Systems: Conduct a thorough assessment of current DDoS defenses, focusing on any automation deficiencies.
  2. Review and Upgrade: Collaborate with vendors to ensure defensive systems are capable of handling high-speed attacks; consider immediate upgrades if necessary.
  3. Training for New Threats: Enhance staff training on the latest trends in cyber threats and adaptive defense mechanisms.
  4. Automate and Test: Implement automated detection and mitigation protocols; conduct regular drills simulating real-world attack scenarios.

If this event teaches us anything, it's that in the modern digital warfare landscape, the only way to deal with fast-moving attacks is to match their speed and force with equally swift defenses. Preparedness is no longer an option but a necessity. You can join the next RISE event in December to continue the conversation and bolster your defense tactics with the brightest minds in cybersecurity.


Sources:


NPM Packages: QR Codes Gone Rogue?

When life gives you cookies, just don't let someone else steal them.

What You Need to Know

Recent developments highlight a new, devious method of malware delivery within NPM packages that you should be aware of. Cybercriminals are utilizing QR codes to fetch cookie-stealing malware, which could have severe implications for data privacy and security. It's critical for board members and executives to be aware of this threat and work closely with their cybersecurity teams to mitigate risks. Proactive steps should include ensuring secure package installations and employing robust monitoring systems to detect abnormal activities quickly.

CISO Focus: Supply Chain Security
Sentiment: Strong Negative
Time to Impact: Immediate


Cybersecurity professionals are grappling with a novel threat vector that recently surfaced within the NPM ecosystem. A package, cloaking itself as a legitimate tool, was discovered to be using QR codes to deploy cookie-stealing malware. This sophisticated ploy presents serious security challenges with potential widespread impact given the popularity and extensive use of NPM packages in software development across the globe.

New Threat Vector in Town

The malicious package was found embedded within the NPM repository, an app marketplace for JavaScript packages. Its modus operandi is rather ingenious—using QR codes to stealthily deliver malware designed to compromise session cookies. Once accessed, these cookies can provide unauthorized access to user accounts, potentially leading to data breaches or account hijacks.

QR codes, conventionally seen as benign conveniences for data sharing, here serve as dubious delivery mechanisms. By scanning these codes, unsuspecting users unknowingly download harmful payloads, which are then executed in the victim's system. This smart maneuver challenges cybersecurity norms, reminding us that innovation is a double-edged sword in the digital arms race.

How It Operates

  • Disguised Legitimacy: The malicious package masquerades within the NPM ecosystem under names that imply utility, attracting developers seeking functionality.
  • QR-based Malware Deployment: Upon installation, these packages utilize embedded QR codes to connect to external servers, thereby fetching malware without directly embedding it in the code.
  • Cookie Theft: The main objective is to capture session cookies. Once collected, the malware transmits these to the attackers’ command & control servers.

Immediate Repercussions

The implications of these actions are dire. With session cookies harvested, malevolent actors can replicate valid user sessions, bypassing traditional authentication barriers. This can lead to not only data espionage but also significant disruptions in operational integrity, especially if such breaches target critical infrastructure or key organizational tools.

Proactive Measures

Organizations are urged to prioritize secure software development practices and supply chain security protocols. Constant vigilance is key—integrating real-time monitoring solutions capable of detecting unusual patterns indicative of malware activity.

  • Audit Package Dependencies: Regularly audit and vet all NPM package dependencies.
  • Incorporate Screening Tools: Deploy automated screening tools that check for anomalies in both package behavior and origin.
  • Enhance Incident Response Plans: Ensure your incident response strategies encompass procedures for mitigating impacts from such sophisticated supply chain attacks.

Bittersweet Ending

While this revelation certainly dampens the trust in free and open ecosystems, it serves as a crucial reminder. Securing the supply chain is no longer optional; it's imperative. This incident underscores that threats not only persist but also evolve, often in unexpected ways with technology’s advancement.


Vendor Diligence Questions

  1. How do we verify the security measures of third-party packages in our supply chain?
  2. What processes are in place to identify and remediate unauthorized package behaviors?
  3. How are vendors responding to active threats targeting supply chain vulnerabilities?

Action Plan

  1. Assessment of Current Environment: Review all current NPM packages used within your projects for signs of malicious behavior.
  2. Enhanced Security Protocols: Implement stricter controls over the use of open-source packages, ensuring rigorous vetting processes before integration.
  3. Real-time Monitoring Solutions: Deploy enhanced monitoring tools to ensure swift detection of suspicious activities, particularly around call-backs to known malicious domains.
  4. Continuous Security Training: Conduct regular training sessions for your development teams on the latest security threats and secure coding practices.
  5. Incident Response Activation: Ensure the incident response team is prepared to act swiftly in the event of a detected breach.

Source: NPM package caught using QR Code to fetch cookie-stealing malware


Crypto Crooks Get the Boot: Inside the €100M Crackdown

When crypto castles collapse, it rains marshmallows and subpoenas.

What You Need to Know

Law enforcement agencies across multiple European countries have successfully dismantled a sophisticated crypto fraud ring responsible for defrauding victims of over €100 million. This international operation highlights the importance of robust cyber intelligence and collaboration. Executives must now evaluate security postures and ensure comprehensive vendor diligence to prevent potential breaches. Immediate action is recommended to fortify defenses against crypto fraud.

CISO Focus: Financial fraud, Cryptocurrency, Cybercrime
Sentiment: Strong Positive
Time to Impact: Immediate


A Multinational Quest for Justice

In a gigantic leap for cyber justice, European law enforcement authorities have dismantled a notorious crypto fraud syndicate with tentacles sprawling across the continent. Spearheading the operation dubbed "Operation Drain the Wallets," authorities from Germany, Serbia, Bulgaria, Cyprus, and Ukraine executed 15 house searches, leading to the arrest of several key players in this fraudulent enterprise. The crackdown emphasizes the persistent vulnerabilities in the financial sector and the urgent necessity for advanced cyber intelligence.

The Heist Overview

The operation targeted a network that capitalized on human psychology and digital blindsides, with call centers employing charm-turned-conmen proficient in multiple languages. They lured victims into a web of deceit by persuading them to invest in nonexistent cryptocurrency schemes, transportation them to financial fantasy lands that ended up in desolate loss.

  • Estimated Loss: Victims were stripped of more than €100 million.
  • Scope of Operation: Over 400 police officers were involved, highlighting the scale and severity of the scam.
  • Modus Operandi: The scam used both social engineering and technology to exploit victims, including slick websites and aggressive sales tactics.

A Knit Network Unraveled

The success of this crackdown reflects the power of international collaboration and fastidious cyber sleuthing. With financial crime never confined by borders, cooperation was key. Furthermore, the operation underscores the principal role robust cyber intelligence plays, offering a timely reminder to businesses still underestimating the prowess of fraudsters within the digital realm.

  • Multi-Nation Effort: Spearheaded by German law enforcement, the operation witnessed the admirable synergy of cross-border teamwork.
  • Outcome: Seizure of extensive data and assets; unraveling of intricately woven layers of deceit.

Lies Well Spun Get Unspooled

The strategy used to con victims rested heavily on manipulating trust and exploiting ignorance around the burgeoning field of cryptocurrencies—a mechanism designed by the very technology expected to democratize wealth.

  • Tactics: Infiltration of financial systems using impersonation and psychological manipulation.
  • Technology: Use of see-it-to-believe-it strategy, employing polished digital assets to establish legitimacy.

Rising to the Challenge

This dismantlement calls for a recalibration of business strategies focusing on proactive threat management. Stable security infrastructures not only shield company assets but also orchestrate smooth business continuity, reducing the appeal that crypto scams hold over unwary individuals.

  • For Companies: Establishing a decentralized financial watchdog mechanism ensures fraudsters are kept at bay.
  • For Individuals: Education is paramount to understand the digital currencies' ecosystem vulnerabilities.

Vendor Diligence Questions

  1. Do our current vendors utilize multi-factor authentication and efficient encryption methods for sensitive financial transactions?
  2. What proactive measures are vendors taking to identify and combat social engineering tactics targeting cryptocurrency platforms?
  3. How frequently do vendors update their security protocols to accommodate evolving threats within the cyber landscape?

Action Plan

  1. Immediate Review: Evaluate existing financial transaction monitoring systems and conduct a thorough review of the security measures.
  2. Employee Training: Launch mandatory training sessions to raise awareness about crypto fraud and strengthen social engineering identification skills.
  3. Partner with Authorities: Establish connections with cyber authorities to stay on top of emerging threats and foster a community of shared intelligence.

Why It's Curtains for Crypto Villains

In this exhilarating episode of cyber vigilance, the €100 million eradication represents not just a win against fraudulent operations but a glowing beacon for future operations. Cybercriminals, beware—those who sow deceit shall reap cuffs.


Sources:


Kiss and MITRE-Up: A Cybersecurity Drama Unfolds

In the world of cyber, sometimes it’s the ones who walk out that make the most noise.

What You Need to Know

Recent announcements from Microsoft, SentinelOne, and Palo Alto Networks reveal they are opting out of the highly regarded MITRE Engenuity ATT&CK Evaluations for 2025. This decision raises questions about the program's future relevance, especially as these vendors ranked prominently in last year’s evaluations. Executive management should closely monitor the potential impact on industry standards and adjust strategic plans accordingly.

CISO Focus: Industry Benchmarking & Threat Detection
Sentiment: Neutral
Time to Impact: Short (3-18 months)


In a surprising twist that has the cybersecurity community abuzz, some of the industry's biggest players—Microsoft, SentinelOne, and Palo Alto Networks—have withdrawn from MITRE Engenuity’s 2025 ATT&CK Evaluations. This decision, coming after their impressive performances in the previous year’s tests, casts doubt on the future relevance and objectivity of these evaluations. MITRE testers are left standing on the dance floor alone, questioning the appeal of their annual gala.

Why the Exit?

The exits are perceived variously as a response to evolving evaluation methodologies or an indication of shifting priorities within these companies. Charles Clancy, MITRE's CTO, hints that behind-the-scenes changes might have motivated the withdrawal, indicating a potential rift between the assessors and the assessed.

Reaction from the Cyber Community

The cybersecurity community is divided. Some see this as a strategic move by the companies to avoid potential negative outcomes from this year's upcoming evaluations, while others speculate about potential discontent or disagreements over evaluation criteria.

MITRE's Defense

MITRE remains bullish about the value of their evaluations, asserting the need for continual development and evolution in their methodologies to stay ahead of cyber threats. The organization stresses the importance of these tests in setting benchmarks for threat identification and response.

The Ripples of Withdrawal

Potential Impact on Industry Standards

Evaluations like those conducted by MITRE provide a standard by which industry participants can measure their threat detection capabilities. The withdrawal of major players could distort this scale, affecting the perceived impartiality and universality of subsequent assessments.

Vendor Trust and Transparency

The transparency and trust these evaluations inspire are fundamental to vendor-client relationships. These spontaneous withdrawals could seed doubt and fuel a narrative of evasiveness or fear of unfavourable results—potentially impacting market perception.

The Broader Picture: Where Do We Go From Here?

  • Market Dynamics:
    The pullout may herald a shift towards in-house, proprietary evaluations and away from shared, public assessments.

  • Alternative Evaluations:
    This scenario might prompt other third-party evaluators to fill the perceived vacuum, offering different or more "vendor-friendly" alternatives.

  • Vendor Strategy:
    Vendors must navigate the delicate balance between demonstrating supremacy in existing standards and remaining adaptable to evolving, possibly less transparent, criteria.

This content, while surprising, underscores the dynamic and ever-evolving dance of cybersecurity; it remains to be seen who will lead or follow in this intricate performance.


Vendor Diligence Questions

  1. How will you ensure transparency and objectivity in security evaluations in the absence of participation in established third-party assessments?
  2. What alternative evaluation strategies do you plan to employ to assure stakeholders of your products' performance?
  3. How do these changes in participation align with your broader strategic objectives and commitment to cybersecurity excellence?

Action Plan

  • Assess and Monitor:
    Constantly assess current vendor capabilities and compare them to emerging industry standards.

  • Update Evaluation Criteria:
    Revise and enhance internal assessment frameworks to incorporate broader evaluation criteria.

  • Engagement and Communication:
    Maintain open channels with current vendors to understand their evaluation strategies and additional ways to gauge their product effectiveness.

Signing Off on MITRE Madness

While the stone in the MITRE’s crown looks a tad tarnished, it remains a prominent symbol of cybersecurity benchmarks. Its continuing value will depend on the cooperation and transparency of industry leaders willing to subject their pride to public scrutiny—an inherently risky but necessary endeavour in a field where threat levels are consistently on the rise.


Source: Infosecurity Magazine


Typosquatting: The Art of Misspelling for Malicious Mischief

Typo hunters out there, here’s your holy grail of cyber mischief. Beware, lest you fall victim to their artful dodging!

What You Need to Know

The phenomenon of typosquatting, a malicious activity that exploits common typing errors to mislead users, has been gaining notoriety. As a board or executive management group, understanding that these deceptive practices could potentially harm corporate reputation and breach sensitive data is crucial. It’s expected that you implement stringent controls and user education to mitigate this risk.

CISO focus: Threat Detection, User Awareness, and Incident Response
Sentiment: Strong Negative
Time to Impact: Immediate


In the murky world of cyber tactics, typosquatting stands out as a clever yet sinister art form. This exploitative practice preys on human error—specifically, our tendency to mis-type addresses. With stakes as high as corporate integrity and security, a keen eye and quick action are crucial.

Typosquatting Uncovered

Typosquatting hinges on the creation of deceptive websites that mimic popular domains, only to capture unsuspecting users who inadvertently make typographical errors while entering web addresses. For instance, mistyping "goolge.com" instead of "google.com" might lead to a malicious site designed to phish credentials or propagate malware. These fraudulent sites often mirror legitimate ones to evade suspicion, allowing attackers to gather sensitive user information.

Common Tactics:

  • Typographical Errors: Slight misspellings of well-known domains.

  • Visual Similarity: Replacing certain letters with look-alikes (e.g., 'rn' for 'm').

  • Alternate Domain Extensions: Using different domain suffixes (e.g., ".net" instead of ".com").

Typosquatting capitalizes on human error, using our propensity for mistakes against us. In addition to phishing attacks, these sites often display ads for competitors or host malicious content, thus harming both consumers and the businesses involved.

The Impact on Businesses

Beyond individual inconvenience, typosquatting presents broader risks to businesses, especially those operating online commerce platforms or services involving personal data.

  • Brand Damage: Imitative sites can mislead search engines and harm a brand's reputation.

  • Customer Trust: Customers who fall prey to typosquats may blame the original brand for any ensuing damages.

  • Financial Losses: Beyond trust, direct financial impacts arise from lost sales or fraudulent transactions.

Risk Mitigation Strategies

Companies must adopt a proactive stance to fend off typosquatters. Here are some best practices:

  1. Domain Monitoring: Regularly check for new domains suspiciously close to your own.

  2. Defensive Registrations: Secure alternate spellings and variations of your domains.

  3. User Education: Equip users with the knowledge to recognize and avoid phishing attacks.

  4. Deploy DNS Filtering: This technology blocks access to known malicious sites.

Use monitoring tools and engage intelligence services to oversee these domains and take action against infringing sites. Some services even offer take-down features, restoring control over digital territory.

Victim Stories are Real

Corporations ranging from tech giants to small online retailers have reported substantial damages due to typosquatting. Notably, cases have emerged where entire database credentials were seized, leading to significant business disruptions and public outcry.

In one poignant example, a seemingly innocuous typo redirected a company's clients to a competitor, leading to a massive data leak that took months to rectify. Such incidents stress the importance of vigilance and preparedness in the face of this daunting digital nuisance.

The Future Outlook

As technology advances, so too will the sophistication of typosquatters. While many protective measures are available today, the onus is on businesses and users to stay ahead through constant vigilance. In the race between defenders and offenders, information and readiness remain our sharpest tools.

Remember: The Internet is like a tangled web, waiting to catch those who wander off-path. Stay aware, stay secure—don't let the cyber spiders get you down.


Vendor Diligence Questions

  1. What measures does the vendor have in place for monitoring and taking down typosquatted domains?
  2. How does the vendor educate its clients and partners about the risks and signs of typosquatting?
  3. Can the vendor provide case studies or metrics demonstrating their effectiveness in combating typosquatting?

Action Plan

  1. Audit Current Domain Holdings: Ensure all possible variations of corporate domains are accounted for.

  2. Enhance Monitoring and Detection Mechanisms: Regularly update systems to scan for and flag unauthorized use of similar domain names.

  3. Implement User Awareness Campaigns: Conduct regular training on recognizing and reporting phishing attempts and suspicious URLs.

  4. Partner with a Typosquatting Prevention Service: Choose a reliable vendor to help monitor and address typosquatting threats.

Remember, vigilance is the linchpin in the daily defense against these unseen adversaries.


Source: Typosquatting Explained with Real-World Examples | UpGuard


Streamlining Identity Governance: Unlocking the Password Pains

An identity crisis solved—not by therapy, but by technology.

What You Need to Know

In the fast-evolving digital landscape, identity governance has become more than just a buzzword—it's an essential component of enterprise cybersecurity. The latest insights unveil five pivotal strategies to streamline identity governance with a free tool, ensuring your enterprise remains resilient against potential identity threats. Immediate focus is required on implementing these strategies to safeguard your systems. The board and executive management group must prioritize resource allocation towards these identity governance measures and mandate their rapid adoption within the IT framework.

CISO focus: Identity & Access Management
Sentiment: Positive
Time to Impact: Immediate


As organizations expand their digital footprints, ensuring robust identity governance becomes paramount. An article from Bleeping Computer reveals actionable insights into optimizing identity governance processes using free tools that offer tangible benefits without budgetary burdens.

The Identity Quagmire

For businesses today, the spiraling complexity of managing user credentials and access rights can be overwhelming. With rising cyber threats, poorly managed identities can lead to disastrous breaches. Organizations often struggle with outdated processes, leading to inefficiencies, and security gaps.

5 Strategies to Optimize Identity Governance

  1. Centralized Identity Management

    • Streamline employee onboarding/offboarding by centralizing identity management. This consolidates user data, reducing the risk of missed revocations or erroneous permissions.
    • Simplify compliance reporting and audits by maintaining a single source of truth for identity data.
  2. Automated Access Reviews

    • Leverage automation to conduct regular access reviews, ensuring only authorized users retain necessary permissions.
    • Reduce admin workload while increasing accuracy and reliability in identity governance.
  3. Self-Service Features

    • Implement self-service password resets and profile management to empower users.
    • This not only enhances user satisfaction but also alleviates IT support burdens.
  4. Enhanced Monitoring and Reporting

    • Deploy tools to monitor for anomalies and report against predefined alerts. This aids in the rapid identification and response to potential threats.
    • Use analytics to forecast potential identity risks and proactively address them.
  5. Integration Capabilities

    • Opt for tools that seamlessly integrate with your existing systems, such as HR platforms and access management solutions.
    • This ensures continuity and bolsters the efficacy of governance efforts.

Why Free Is Not a Fad

Contrary to the adage, sometimes the best things in cybersecurity can be free—if leveraged correctly. Free tools can offer:

  • Resilience: Quick deployment and testing without elaborate procurement cycles.
  • Scalability: Adjust to evolving business size and needs smoothly.
  • Adaptability: The ability to customize and optimize features according to specific organizational requirements.

The Free Tool in Focus

The free tool discussed by Bleeping Computer provides essential functionalities for comprehensive identity governance. Its easy integration and user-friendly features significantly enhance its appeal, allowing organizations to adopt modern governance practices without financial strain.

Preventing the Next Identity Crisis

As identity threats evolve, so must defense strategies. New waves of identity attacks could exploit weak governance structures. This constantly changing threat landscape necessitates:

  • Continuous Education: Regular training and updates for IT staff and users on best practices.
  • Frequent Audits: To ensure compliance and adapt controls accordingly.
  • Proactive Communication: Between departments to promptly address any governance issues.

Sentiment Analysis: The overall sentiment is positive due to the potential immediate impact and cost-effectiveness of the recommended strategies.

Time to Impact: Given the immediate applicability of the strategies, organizations can quickly integrate these practices into their existing systems for fast results.


Vendor Diligence Questions

  1. How does this free tool align with existing identity management frameworks in terms of features and scalability?
  2. What support and maintenance options accompany this tool, given its free nature?
  3. How does the tool ensure data security and compliance in multi-regional enterprises?

Action Plan

  1. Assessment: Evaluate current identity governance practices and identify gaps that the free tool can address.

  2. Integration: Pilot the tool in a controlled environment to understand integration capabilities and monitor its efficacy.

  3. Training: Conduct workshops for IT teams on optimizing the tool’s performance and aligning it with enterprise security policies.

  4. Review: Establish a bi-monthly review cycle to assess the impact and adapt strategies as necessary based on analytics inputs.

  5. Feedback Loop: Create channels for collecting feedback from end-users to refine processes and enhance user experience.


Source: 5 ways to streamline Identity Governance with this free tool


CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career.

We're passionate advocates for good cybersecurity at home, at work, and in government.

Thank you so much for your support!

CISO Intelligence by Jonathan Care is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International