March 2025 Cybersecurity Developments Under the Trump Administration

This article discusses the latest cybersecurity developments in March 2025 under the Trump administration, highlighting significant executive decisions aimed at improving national preparedness and modernising cybersecurity frameworks. Source: Article Key Points The Trump Administration released an Executive Order focusing on state and local government preparedness for cyber-attacks. A National Resilience Strategy was launched, alongside a […]

Read More →

BreachRX

BreachRx is revolutionising incident response with its intelligent platform, designed to ensure operational resilience within enterprises. This San Francisco-based cybersecurity firm aims to change the game by shifting incident response from a reactive, isolated process to a proactive, company-wide function that evolves alongside regulatory needs. Their automation capabilities streamline incident response planning, providing clear guidance […]

Read More →

Microsoft strengthens in-house cyber governance, training

Microsoft has made significant strides in enhancing its cybersecurity measures, as part of its Secure Future Initiative, following a wave of damaging cyberattacks. Key Points The Secure Future Initiative aims to reinforce security across product development, threat detection, and governance. 22,000 employees have been equipped with a secure-by-design toolkit. Employee performance reviews are now connected […]

Read More →

Maintain to sustain: why CMMC is a continued practice

Dr. Thomas Graham, Chief Information Security Officer at Redspin, explores the ongoing commitment required for compliance with the Cybersecurity Maturity Model Certification (CMMC). He argues that becoming certified is just the beginning of a longer, demanding journey that requires sustained effort and regular review to ensure lasting security. Source: Washington Technology Key Points The CMMC […]

Read More →

CISA loses secure by design leaders among voluntary departures

Senior advisors Bob Lord and Lauren Zabierek from the Cybersecurity and Infrastructure Security Agency (CISA) are leaving their positions, raising serious concerns about the future of the “secure by design” initiative. Their departure may impact the agency’s efforts in promoting security measures in software development. Source: InsideCyberSecurity.com Key Points Bob Lord and Lauren Zabierek are […]

Read More →

AI Explained: What Businesses Need to Know for Enterprise AI Adoption

This article from PYMNTS breaks down the essential elements of adopting Enterprise AI in the business realm. It addresses the differences between consumer AI and Enterprise AI, and the big ticket items for companies considering integrating AI into their operations. With insights from industry leaders like Dell’s John Roese, the article outlines the critical steps […]

Read More →

2025 RIMS Preview: The Future of Cyber Risk Management

This article dives into the evolution of cyber risk management and the pressing need for organisations to adapt alongside changing regulations and emerging cyber threats. Highlighting an upcoming session at RISKWORLD 2025, the session features industry experts who will discuss innovative insurance solutions for contemporary risks. Attendees can expect invaluable insights into managing complex cyber […]

Read More →

What is a brute-force attack?

Summary A brute-force attack is a straightforward hacking technique where cybercriminals systematically attempt to guess login credentials or encryption keys to gain unauthorised access. This approach relies on exhausting all possible combinations of characters, making it a rather simplistic yet effective form of cyber intrusion. Attackers may utilise various methods, including simple brute-force, dictionary attacks, […]

Read More →