CSec Weekly
Archive
Subscribe
Search
Log In
Eyal Estrin

✍ Author of Cloud Security Handbook & Security for Cloud Native Applications ☁ AWS · Azure · GCP 💭 All opinions are my own 🌐


Dec 23, 2025

byEyal Estrin

Enterprise VPNs Targeted with Massive Password Probing

What security leaders are watching as credential attacks and OT risk rise

Enterprise VPNs Targeted with Massive Password Probing

Dec 16, 2025

byEyal Estrin

AI Now Tops the List of Cybersecurity Threats

Learnings from AI danger, fake access and a major airline hack

AI Now Tops the List of Cybersecurity Threats

Dec 9, 2025

byEyal Estrin

npm Supply Chain Breach Exposes Cloud Secrets

Why every CISO should audit dependencies, review third‐party apps and vet AI tools

npm Supply Chain Breach Exposes Cloud Secrets

Dec 2, 2025

byEyal Estrin

OpenAI breach exposes analytics‐partner phishing risk

Email phishing and insider leaks show third‐party risks remain high

OpenAI breach exposes analytics‐partner phishing risk

Nov 25, 2025

byEyal Estrin

Fortinet’s critical bug quietly exploited in the wild

Cloud outages and exploited flaws highlight the need for stronger security

Fortinet’s critical bug quietly exploited in the wild

Nov 18, 2025

byEyal Estrin

Why Your Enterprise Credentials Are Still the Weakest Link

Still vulnerable: credentials, legacy tech and regulatory change

Why Your Enterprise Credentials Are Still the Weakest Link

Nov 11, 2025

byEyal Estrin

Key Findings from The CrowdStrike 2025 Threat Report

AI, Ransomware, and Emerging Enterprise Cyber Risks

Key Findings from The CrowdStrike 2025 Threat Report

Nov 4, 2025

byEyal Estrin

Why Paying Ransoms Still Costs You Your Data

Ransomware risks, AI guardrails, and data control challenges every CISO must tackle today

Why Paying Ransoms Still Costs You Your Data

Oct 28, 2025

byEyal Estrin

Top Priority: National Security Breach

From Nuclear Breaches to AI Threats: What CISOs Must Watch This Month

Top Priority: National Security Breach

Oct 21, 2025

byEyal Estrin

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Critical infrastructure threats, operational disruption, and architectural gaps shaping the CISO agenda

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Oct 7, 2025

byEyal Estrin

Managing AI Threats, Data Breaches, and Talent Shortages

Key lessons on emerging AI threats, real-world breaches, training pitfalls, talent shortages, and board communication strategies to strengthen organizational defenses.

Managing AI Threats, Data Breaches, and Talent Shortages

Sep 29, 2025

byEyal Estrin

Strengthening Security in an AI-Driven World

Key strategies for CISOs to manage AI risks, adopt preemptive defenses, and protect critical infrastructure from evolving cyber threats.

Strengthening Security in an AI-Driven World

Sep 22, 2025

byEyal Estrin

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

Organizations must balance rapid threat response, AI-driven security, privacy considerations, and workforce adaptation to stay ahead in an evolving cyber landscape.

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

CSec Weekly

The Cyber Security News That Matter to Leaders


Quick Links

Subscribe

Archive

Authors

Subscription

Signup

Login

Reset Password

Update Password

Search

© 2025 CSec Weekly by SmartClouds.ai.

Report abuse

Privacy policy

Terms of use

Powered by beehiiv