Jonathan Care

Jonathan Care

Security vs Ethics, Old Botnet: New Playbook, Old School Espionage, Hackers Learn Quickly, and Patching the Patches. It's Your Friday 9th January 2025 Edition of CISO Intelligence!

Security vs Ethics, Old Botnet: New Playbook, Old School Espionage, Hackers Learn Quickly, and Patching the Patches. It's Your Friday 9th January 2025 Edition of CISO Intelligence!

Today's topics: balancing the trust factor against corporate security, a dangerous new field for an old adversary, state-sponsored espionage and the possible global fallout, hackers keeping up with the latest security measures, and when even the best have to scramble. Thank goodness it’s Friday!
Read More
London Under Digital Siege, No More Passwords Anymore? Big Ships Upscaling Their Security Responses, Vulnerability Management in the Spotlight, and the Healthcare Security Overhaul. It's Your Wednesday 8th January 2025 Edition of CISO Intelligence!

London Under Digital Siege, No More Passwords Anymore? Big Ships Upscaling Their Security Responses, Vulnerability Management in the Spotlight, and the Healthcare Security Overhaul. It's Your Wednesday 8th January 2025 Edition of CISO Intelligence!

Today’s topics: London's struggling cybersecurity systems, the demise of password management, big hitters needing incident responses on steroids, the metamorphosis of vulnerability management, and healthcare needing its own major cybersecurity surgery. So many topics, so little space!
Read More
The 'Softly Softly' Training Technique, How to Keep the Funds and the Reputation, the Belt and Braces Approach to Block Phishing, Old Adversary: New Games, and Avoiding Digital Minefields. It's the Tuesday 7th January 2025 Edition of CISO Intelligence!

The 'Softly Softly' Training Technique, How to Keep the Funds and the Reputation, the Belt and Braces Approach to Block Phishing, Old Adversary: New Games, and Avoiding Digital Minefields. It's the Tuesday 7th January 2025 Edition of CISO Intelligence!

Today we're looking at the gentle approach to cybersecurity enforcement, keeping the phish out of the pool, the "expecting the worst" default position, the return of ZLoader with a new trick, and walking the digital risk tightrope. Plus a cute picture.
Read More
An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements,  ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements, ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

Today's topics: it's not the earth that's moving, doing what's necessary vs fully understanding and completing the mission, when safeguarding means checking ALL the loopholes, external vendors needing more than a pat down, and doing the hacker two-step. Your Monday warm-up!
Read More
To Source or Not to Outsource Support, Wiper: The Totally Clean Sweep, Mitigating Remote Working Risks, Tech Skills Outstripping Education, and Defense Needing Defense. It's the Friday 3rd January 2025 Edition of CISO Intelligence!

To Source or Not to Outsource Support, Wiper: The Totally Clean Sweep, Mitigating Remote Working Risks, Tech Skills Outstripping Education, and Defense Needing Defense. It's the Friday 3rd January 2025 Edition of CISO Intelligence!

Today's hot topics: the vulnerabilities of outsourcing IT support, malware that provides a perfectly clean slate, the security protocols associated with remote working, old education tech being overtaken by up-to-date skills, and Acronis needing its own protection. Keeping you informed!
Read More

Covering the AI Arc, Spreading the Protection Net, Plugging Data Leaks, Really Knowing Who's Logging In, and Keeping Up with Cloud Certification. It's the Thursday 2nd January 2025 Edition of CISO Intelligence!

Today's topics: the dilemmas of AI regulation, how to cover all of the vulnerability bases, minimising data asset leaks, checking, double-checking and triple-checking login authenticity, and when certifications are not just participation awards. CISO Intelligence, keeping you informed!
Read More