Computerworld.com reported that “The rapid evolution of consumer drone technology is reshaping its potential uses in many ways, including its application in cyberattacks.

Modern consumer drones are quieter, faster, and equipped with longer battery life, enabling them to operate further from their operators. They can autonomously navigate obstacles, track

Continue Reading  Anyone surprised that drones are the future of cybercrime?

CIO.com reported that “CEOs, their boards, and the rest of the C-suite continue to push AI as a strategic imperative. As a result, IT’s investments in AI are up, with the percentage of the IT budget earmarked for AI projects nearly tripling from last year, according to the 2025 CIO

Continue Reading Cost of AI is forcing CIOs to rethink IT!

CIO.com reported that “AI and analytics are transforming how businesses operate, compete and grow. However, even the most sophisticated models and platforms can be undone by a single point of failure: poor data quality. This challenge remains deceptively overlooked despite its profound impact on strategy and execution. The decisions you

Continue Reading Why you can’t trust BIG DATA to help AI!


DarkReading.com reported that “Fake DeepSeek ads in Google search results are delivering infostealing malware to unsuspecting users.”  The March 27, 2025 article entitled “Fake DeepSeek Ads Spread Malware to Google Users” (https://www.darkreading.com/vulnerabilities-threats/fake-deepseek-ads-spread-malware-google) included these comments:

DeepSeek, a Chinese generative AI (GenAI) company, became a household name earlier this

Continue Reading Watch out for malware for Google from fake DeepSeek!

CSOonline.com reported “Since modern enterprises run on software, poor vulnerability management represents a serious business risk. So, how are CISOs modernizing their programs to improve risk mitigation?” The April 2, 2025 article entitled “10 best practices for vulnerability management according to CISOs” (https://www.csoonline.com/article/3853759/10-best-practices-for-vulnerability-management-according-to-cisos.html) included these comments about #7.

Continue Reading Good advice from CISOs about 10 best practices for vulnerability management includes strict Service Level Agreements!

CSOonline.com reported that “A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and potentially endangering more than 140,000 enterprise customers. The attacker is now demanding ransom payments while actively marketing the stolen data on underground forums,…”  The March 24, 2025 article entitled ” Oracle

Continue Reading 140,000 Oracle Cloud enterprise customers at risk because of ransomware demand!

SCWorld.com reported that “Almost all businesses need cybersecurity insurance to manage their digital risk, but not all realize that there are ways to reduce their insurance premiums by implementing certain protections.” The March 26, 2025 article entitled “How two organizations beat the cyber insurance maze” (https://tinyurl.com/mu2wec54) included these

Continue Reading How MFA, EDR, and XDR can reduce the cost of Cybersecurity insurance!

SCWorld.com reported that “News of the troubled DNA testing services company 23andMe filing for Chapter 11 bankruptcy protection set off a spirited debate in the security community this week as experts expressed concern over the fate of the DNA data the company collected for the past two decades.”  The March

Continue Reading 23andMe bankruptcy threatens privacy of millions around the world!

Darkreading.com reported that “Research finds that organizations are granting root access by default and making other big missteps, including a Jenga-like building concept, in deploying and configuring AI services in cloud deployments.” The March 18, 2025 article entitled “AI Cloud Adoption Is Rife With Cyber Mistakes” (https://www.darkreading.com/cloud-security/ai-cloud-adoption-cyber-mistakes) included

Continue Reading AI in the Cloud may lead to Cyberattacks!