• 09 May 2026

    What Decades of Penetration Testing Taught Me (and what Ben Rothke confirmed)

    After decades of testing systems for security flaws, many (arguably most) things haven't changed. One in particular: most security failures still come down to basics that were assumed, ignored, or never verified. The sophisticated attacks that media and Hollywood prop up are rarely the real problem. The gaps no one is following up on are. That's what keeps me busy... It's things like the crazy simple stuff that people overlook ...

    Continue Reading...
  • 13 Apr 2026

    The real problem with threat intelligence isn’t volume

    Most enterprise threat intelligence programs didn’t end up where they are by accident. They evolved that way over time. One feed, one tool, one integration at a time. The thought was: more data, more visibility, better security. But then complexity grows until the moving parts are no longer serving the mission. I’ve seen this happen across organizations of all sizes, and on the surface, it looks like progress is happening. ...

    Continue Reading...
  • 21 Mar 2026

    The biggest AI risk in your company has a corner office

    We spend a lot of time worrying about employees clicking email links and reusing passwords. Both are valid concerns in our new world of AI. But this approach misses a larger (and more shocking) reality. The single biggest AI-related risk in most organizations is at the help desk or buried somewhere in accounting or IT. It’s sitting in the C-suite, operating with authority and speed, with little to no friction. ...

    Continue Reading...
  • 04 Mar 2026

    The Epstein Files and the email footer that changed nothing

    "Here is a rich man who is the victim of a painful and persistent disease as the result of gluttony. He is willing to give large sums of money to get rid of it, but he will not sacrifice his gluttonous desires. He wants to gratify his taste for rich and unnatural viands and have his health as well. Such a man is totally unfit to have health, because he ...

    Continue Reading...
  • 26 Jan 2026

    Security’s defensibility problem. Can you truly defend what you’ve built?

    You've secured the budget. You've implemented the program. You've checked every box on the information security checklist. Frameworks? Followed. Best practices? Established. Policies? Written and approved. The technology stack is humming along, auditors are nodding approvingly, and consultants are signing off on your approach. Everything suggests your network and information assets are locked down tight. Then the breach happens. The investigation reveals gaps you never saw coming. How did this ...

    Continue Reading...
  • 27 Oct 2025

    Doing the Hard Things (in security, and in life)

    Everything is easy, until it's not... When you start a new relationship, everything feels easy. It’s exciting. It’s fresh. You want to impress. You like being impressed. You want to explore. Every day feels like a new adventure. But then reality sets in. The fun stuff gives way to routine, and routine takes work. You start learning nuances and dynamics. You have to show up. You have to communicate. You ...

    Continue Reading...
  • 19 Oct 2025

    Embracing Incident Response at Petit Le Mans: A Positive Outlook for Cybersecurity?

    At the Petit Le Mans race this past weekend, the TV announcers couldn’t stop talking about incident responsibility. Apparently, the International Motor Sports Association (IMSA) made it clear they’re done tolerating sloppy driving. [SIDENOTE: I certainly had my fair share of that back when I raced - like this example]. The rules of racing have always been there; now IMSA says they’re finally going to enforce them. Zero tolerance. No ...

    Continue Reading...
  • 15 Oct 2025

    Hacking For Dummies, 8th edition…It’s official!

    After months of writing, revising, and updating real-world examples, Hacking For Dummies, 8th Edition is finally out in the wild.👉 Get it here on Amazon (affiliate link) This book has been a part of my professional life for over two decades now. Thanks to you — my readers, clients, and colleagues — it’s been translated into nine languages and remains the top-selling book in its category over the past decade. ...

    Continue Reading...
  • 26 Aug 2025

    Leverage MSSPs where it makes sense, but do your due diligence

    It seems that more and more businesses are leveraging managed security service providers (MSSPs) to help with ongoing security improvements. I think this is a positive sign that both IT professionals and business leaders are realizing that they can't do it all in terms of security. There’s no shame in that game if outsourcing managed security services is done for the right reasons. No doubt, some businesses wish to engage ...

    Continue Reading...
  • 29 Jul 2025

    Don’t let your security program fail like a bad relationship

    TL;DR - Just like a relationship, a security program needs honesty, maintenance, and timely conflict resolution...or it will collapse under neglect.  Success expert Brendon Burchard said that avoidance is the best short-term strategy to escape conflict, and the best long-term strategy to ensure suffering. I've seen it countless times over the years...companies that keep kicking security problems down the road. That is, until one day, those problems explode into things ...

    Continue Reading...