Latest editions

When Politics Weakens Cyber Defense

When Politics Weakens Cyber Defense

Not every cyber crisis begins with a breach. Sometimes, it s…

From Pilots to Mandates - Digital ID Becomes Infrastructure

From Pilots to Mandates – Digital ID Becomes Infrastructure

On September 25, the UK government confirmed that by 2029, e…

Capital Flows to Counter AI Agents Risks

Capital Flows to Counter AI Agents Risks

On September 16, researchers disclosed ShadowLeak, a zero-cl…

AI Identity Attacks. From Novel to Normal

AI Identity Attacks. From Novel to Normal

AI-powered identity abuse moved from novel to normal this we…

Kids’ privacy enforcement steps up.

Kids Privacy Enforcement Steps Up

Cybersecurity as a Business. Sep 1-7, 2025 Edition Children’…

2025 Cybersecurity Predictions

Cybersecurity Predictions 2025 – How to Prepare

I’ve been monitoring the cybersecurity space for more than t…

Strategy Implementation

How To Close the Strategy Implementation Gap

Over the years, I’ve had my fair share of strategy dra…

security tips for small businesses on a budget

12 Cybersecurity Tips For Small Businesses On A Budget

Many small business owners understandably fear that robust c…

small business cybersecurity how-to

Small Business Cybersecurity How To – Six Easy Steps

Over 70% of US small business owners reported a cyber-attack…