Incident Summary In mid-October, F5 confirmed that a nation-state actor gained long-term access to its internal systems and stole portions of BIG-IP source code along with internal vulnerability research....
Sovereign by Default
Key Takeaways Macro Outlook The regulatory tide has turned into a current.What began as privacy (and political) rhetoric is now shaping business models and revenue forecasts. In one week,...
When Politics Weakens Cyber Defense
Not every cyber crisis begins with a breach. Sometimes, it starts with a political decision. Or the lack of one. Last week, the CISA 2015 Information-Sharing Act expired. At...
From Pilots to Mandates – Digital ID Becomes Infrastructure
On September 25, the UK government confirmed that by 2029, every employer will be required to use a digital ID system for Right-to-Work checks. The rollout will happen via...
Capital Flows to Counter AI Agents Risks
On September 16, researchers disclosed ShadowLeak, a zero-click flaw in ChatGPT’s Deep Research that exfiltrated Gmail through a connector. No click, no phishing page, just a crafted input. At...
AI Identity Attacks. From Novel to Normal
AI-powered identity abuse moved from novel to normal this week. On September 12, Okta detailed VoidProxy, a phishing-as-a-service kit that bypasses MFA (Multi-Factor Authentication) by stealing sessions in real...
Kids Privacy Enforcement Steps Up
Cybersecurity as a Business. Sep 1-7, 2025 Edition Children’s data moved back to the center of policy and enforcement. In the United States, the FTC announced actions that included...
Cybersecurity Predictions 2025 – How to Prepare
I’ve been monitoring the cybersecurity space for more than two decades, but cyber threats are evolving at a pace I’ve never seen before. As technology evolves and the use...
Failing Forward – How to turn Mistake into Great Success
In both business and life, failure is often seen as something to be avoided—a setback or mistake that signals a dead end. Yet, some of the most successful people...