CSec Weekly
Archive
Subscribe
Search
Log In
Eyal Estrin

✍ Author of Cloud Security Handbook & Security for Cloud Native Applications ☁ AWS · Azure · GCP 💭 All opinions are my own 🌐


Mar 17, 2026

byEyal Estrin

The harsh reality of AI vulnerabilities for CISOs

Master new AI defense strategies and secure Salesforce guest settings to prevent the cloud abuse seen in the Telus and Stryker breaches

The harsh reality of AI vulnerabilities for CISOs

Mar 10, 2026

byEyal Estrin

Urgent Patch Required for Cisco Catalyst SD WAN Flaws

Major data breaches at LexisNexis and Star Citizen join urgent VMware warnings as global law enforcement disrupts a key phishing infrastructure hub

Urgent Patch Required for Cisco Catalyst SD WAN Flaws

Mar 3, 2026

byEyal Estrin

US History Largest Breach Risk

Microsoft confirms Copilot email bugs as rogue AI activity and agentic threats push the annual cost of insider risk to nearly 20 million dollars

US History Largest Breach Risk

Feb 24, 2026

byEyal Estrin

The CISO Guide to Enforcing Business Accountability

Identity vishing and infrastructure risk take center stage as luxury brands pay millions for SaaS breaches and the EU halts internal AI use

The CISO Guide to Enforcing Business Accountability

Feb 17, 2026

byEyal Estrin

Ten Major Mistakes That Can End a CISO Career

Fintech and social media breaches highlight a year of supply chain chaos where meeting industry standards is no longer a shield against attacks

Ten Major Mistakes That Can End a CISO Career

Feb 10, 2026

byEyal Estrin

Protecting your firm from autonomous AI threats in 2026

Global threats rise as billions of records leaks and companies struggle to secure AI tools and privileged user accounts

Protecting your firm from autonomous AI threats in 2026

Feb 4, 2026

byEyal Estrin

SolarWinds Critical RCE Flaws Demand Immediate Patching

New data shows soaring GDPR reports, rampant unsanctioned AI tools in use and access gaps for former staff as agencies warn about AI risk

SolarWinds Critical RCE Flaws Demand Immediate Patching

Jan 27, 2026

byEyal Estrin

AI Adoption Creates Huge Cyber Risk Gaps

Supply chain risk rules move forward in Europe while security teams digest ransomware backdoor lessons and phishing threats in energy

AI Adoption Creates Huge Cyber Risk Gaps

Jan 20, 2026

byEyal Estrin

CISOs Shift Focus to Keeping Business Running

Breaking cybercrime nodes and growing AI platform risk show how fraud and source code theft are reshaping security priorities for teams and boards

CISOs Shift Focus to Keeping Business Running

Jan 13, 2026

byEyal Estrin

Security Leaders Must Own AI Agent Identity Risk

Data theft attempts on cloud sharing sites and rising AI risks show why identity verification and compliance focus are top priorities for security teams

Security Leaders Must Own AI Agent Identity Risk

Jan 6, 2026

byEyal Estrin

AI Misuse and Emerging Attack Techniques in 2025

High impact breaches and evolving AI threat landscape underscore need for leadership strategy and hybrid risk frameworks

AI Misuse and Emerging Attack Techniques in 2025

Dec 30, 2025

byEyal Estrin

OWASP Top 10 Brings Clarity to AI Agent Risks

Security leaders face AI agent risk's identity threats and hard lessons from real scenes into ransomware and maritime malware

OWASP Top 10 Brings Clarity to AI Agent Risks

Dec 23, 2025

byEyal Estrin

Enterprise VPNs Targeted with Massive Password Probing

What security leaders are watching as credential attacks and OT risk rise

Enterprise VPNs Targeted with Massive Password Probing

Dec 16, 2025

byEyal Estrin

AI Now Tops the List of Cybersecurity Threats

Learnings from AI danger, fake access and a major airline hack

AI Now Tops the List of Cybersecurity Threats

Dec 9, 2025

byEyal Estrin

npm Supply Chain Breach Exposes Cloud Secrets

Why every CISO should audit dependencies, review third‐party apps and vet AI tools

npm Supply Chain Breach Exposes Cloud Secrets

Dec 2, 2025

byEyal Estrin

OpenAI breach exposes analytics‐partner phishing risk

Email phishing and insider leaks show third‐party risks remain high

OpenAI breach exposes analytics‐partner phishing risk

Nov 25, 2025

byEyal Estrin

Fortinet’s critical bug quietly exploited in the wild

Cloud outages and exploited flaws highlight the need for stronger security

Fortinet’s critical bug quietly exploited in the wild

Nov 18, 2025

byEyal Estrin

Why Your Enterprise Credentials Are Still the Weakest Link

Still vulnerable: credentials, legacy tech and regulatory change

Why Your Enterprise Credentials Are Still the Weakest Link

Nov 11, 2025

byEyal Estrin

Key Findings from The CrowdStrike 2025 Threat Report

AI, Ransomware, and Emerging Enterprise Cyber Risks

Key Findings from The CrowdStrike 2025 Threat Report

Nov 4, 2025

byEyal Estrin

Why Paying Ransoms Still Costs You Your Data

Ransomware risks, AI guardrails, and data control challenges every CISO must tackle today

Why Paying Ransoms Still Costs You Your Data

Oct 28, 2025

byEyal Estrin

Top Priority: National Security Breach

From Nuclear Breaches to AI Threats: What CISOs Must Watch This Month

Top Priority: National Security Breach

Oct 21, 2025

byEyal Estrin

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Critical infrastructure threats, operational disruption, and architectural gaps shaping the CISO agenda

Emerging Threats, Critical Infrastructure Risks, and the Architecture Decisions That Matter

Oct 7, 2025

byEyal Estrin

Managing AI Threats, Data Breaches, and Talent Shortages

Key lessons on emerging AI threats, real-world breaches, training pitfalls, talent shortages, and board communication strategies to strengthen organizational defenses.

Managing AI Threats, Data Breaches, and Talent Shortages

Sep 29, 2025

byEyal Estrin

Strengthening Security in an AI-Driven World

Key strategies for CISOs to manage AI risks, adopt preemptive defenses, and protect critical infrastructure from evolving cyber threats.

Strengthening Security in an AI-Driven World

Sep 22, 2025

byEyal Estrin

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

Organizations must balance rapid threat response, AI-driven security, privacy considerations, and workforce adaptation to stay ahead in an evolving cyber landscape.

Adapting Cybersecurity Strategies in a Rapidly Evolving Landscape

CSec Weekly

The Cyber Security News That Matter to Leaders


Quick Links

Subscription

Search

© 2026 CSec Weekly by SmartClouds.ai.
Report abusePrivacy policyTerms of use
beehiivPowered by beehiiv