✍ Author of Cloud Security Handbook & Security for Cloud Native Applications ☁ AWS · Azure · GCP 💭 All opinions are my own 🌐
Dec 23, 2025
What security leaders are watching as credential attacks and OT risk rise
Dec 16, 2025
Learnings from AI danger, fake access and a major airline hack
Dec 9, 2025
Why every CISO should audit dependencies, review third‐party apps and vet AI tools
Dec 2, 2025
Email phishing and insider leaks show third‐party risks remain high
Nov 25, 2025
Cloud outages and exploited flaws highlight the need for stronger security
Nov 18, 2025
Still vulnerable: credentials, legacy tech and regulatory change
Nov 11, 2025
AI, Ransomware, and Emerging Enterprise Cyber Risks
Nov 4, 2025
Ransomware risks, AI guardrails, and data control challenges every CISO must tackle today
Oct 28, 2025
From Nuclear Breaches to AI Threats: What CISOs Must Watch This Month
Oct 21, 2025
Critical infrastructure threats, operational disruption, and architectural gaps shaping the CISO agenda
Oct 7, 2025
Key lessons on emerging AI threats, real-world breaches, training pitfalls, talent shortages, and board communication strategies to strengthen organizational defenses.
Sep 29, 2025
Key strategies for CISOs to manage AI risks, adopt preemptive defenses, and protect critical infrastructure from evolving cyber threats.
Sep 22, 2025
Organizations must balance rapid threat response, AI-driven security, privacy considerations, and workforce adaptation to stay ahead in an evolving cyber landscape.