Third Party Risk Management The Silent Maestro: Software's Role in Vendor Risk Management. A Thought-Provoking Read for Saturday 22nd February 2025. From useful to essential: how tools change.
Cyber Espionage The Drone Wars, A Dark Star Rising, The Mac Attack, Smooth MS, SEO Detours, and DeepSeek Deep Dives. It's CISO Intelligence for Friday 21st February 2025. Drones: the battle against the highly lucrative cons, multipurpose ransomware that isn't fussy about its victims, once secure Macs are now a hard malware target, MS are finetuning their update systems, being led down the wrong path, and when technology digs a little too deep.
Cyber Threat Management Creek Meets CTEM Paddle, Death-Breaches-Taxes, Lazarus's New Sidekick, Digital Sleight of Hand, Google's AI Defense, and Levelling the Jurisdictional Landscape. It's CISO Intelligence for Wednesday 19th February 2025. Today's topics: CTEM is the new lifeboat, cyber incidents are now an inevitable part of the digital world, Lazarus keeps rising and this time they brought a friend, digital laundering: a whole new magic trick, Google's new AI star player, and compliance is not an option.
Cyber Espionage The Cloak and Dagger Upgrade, A Different Kind of Stew, There's a Hole in the Keystore, Email Intruders, Trimming the Fat, and The New Directive in Town. It's CISO Intelligence for Monday 17th February 2025. Today's topics: The world of espionage is now fully up to speed, sadly there's no comfort food in sight. "Is it secret? Is it safe?" Battening down the email hatches, shedding excess insurance premium weight, and the new GovTech safety blanket.
IoT Vulnerability Exploitation !Exploitable Episode One - Breaking IoT: Misadventures on a Geeky Mediterranean Voyage. A "Gaming" Read for Sunday 16th February 2025 "Let's play a game..."
Data Privacy Unmasking the Masked: The YouTube Privacy Snafu. The CISO Intelligence "Sharp Intake of Breath" Read for Saturday 15th February 2025. A close shave!
Third Party Risk Management The Art of Persuasion, Trojans in Recruiter Clothing, More than Pesky Pests, Etsy: The Latest Scammer Target, Cyber Pirates Going Global, and Unwanted Exposure. It's CISO Intelligence for Friday 14th February 2025. Today's food for thought: sweet-talking the bosses, beware of malware bearing job offers, bugs that need a whole lot more than spray, Etsy is the new hunting ground for support scammers, cyber assaults without frontiers, and stocks with the wrong kind of shares.
Data Protection Angelsense Alarm Bells, Special Brews, Silent School Sentinels, 8Base Takes a Hit, VPN Password Security, and Dangerous Bucket Name Typos. It's CISO Intelligence for Wednesday 12th February 2025. In today's CISO Intelligence: They saw data leaks, creating that special cybersecurity blend, the rise of school protection squads (no shades required), a little less fear and panic, no: you can't use "password", and check your buckets for squatters!
Endpoint Security Group Policies Breached, Hissy Fitting Hackers, Digital Threat Detectives Hard at Work, Cancer Care Sabotage, India's Banking "Safe Space", and Zombie Malware? It's CISO Intelligence for Monday 10th February 2025. The "one policy" format has become somewhat less precious, the black hats are pouting, cyber sleuthing is now a full-time job, cancer doesn't take a break when NHS systems are breached, India has ramped up its banking protections, and proud malware bandits?
Cyber Crime Forums The Epically Seized Forums: Cracked & Nulled. Your CISO Intelligence Read for Sunday 9th February 2025. Really not a good idea to name themselves after their possible fates.
Network Security and Best Practices Network Edge Devices: Your Firewall's Witty Cousin. Your CISO Intelligence Read for Saturday 8th February 2025 Secure the boundaries!
Stiff Upper Lip, Stricken Medical Apparatus, Very Wiley Coyotes, O Appy Days, Only the Best Phishing Toolkit, and When the Silent Partner Fails. It's CISO Intelligence for Friday 7th February 2025. In today's newsletter: British restraint in full force, when the medical equipment needs life support, these coyotes aren't hunting roadrunners, Google's bad app eradication, phishing with style, and what happens when the faithful workhorse fails.