A startling security vulnerability in a recruitment platform used by McDonald's has potentially exposed the personal data of up to 64 million job applicants. The incident serves as a powerful reminder of a risk that has plagued the technology sector for decades: the supply chain. I question whether McDonald's had even done a thorough cybersecurity due diligence when contracting with Paradox.
I also note, while the platform in question uses artificial intelligence, the critical error was deeply human and not a failure of AI at all.
In a historic shift for the digital economy, Apple is being forced by courts and regulators in both the United States and Europe to allow app developers to use any payment method for their apps and in-app purchases-without Apple’s customary commission or fees. While these rulings are set to unleash a wave of fintech innovation and competition, they also introduce new cybersecurity risks that could impact millions of users worldwide. This article explores the legal battles, the global regulatory landscape, the opportunities for fintech, and the security challenges that lie ahead.
Right, let's have a honest discussion about Microsoft Active Directory. For ages, it’s been the bedrock of how most businesses handle logins and access – the familiar, reliable workhorse humming away in the server room. It did its job, absolutely.
But here’s the rub: the world it was built for vanished years ago. Is it appropriate to keep clinging to legacy technology foundations as your main line of identity defence in today's world? Frankly, that’s looking increasingly like bringing a knife to a gunfight.
I had an engaging discussion with David Gadd about the misunderstanding of the CISO role. (Be interested in your views whether you think the CISO role is fully understood and if it isn't, why not! Comment in the LinkedIn post below ⬇️)
Yesterday, 24th February 2025, I received the heartbreaking news that one of the cybersecurity vendors I had worked with since 2006, Skybox Security, has closed its doors.
The announcement came as a shock, first shared with employees on a call and later communicated to channel partners via email. Skybox Security was once a visionary company, yet it has now faced an unfortunate end.
My thoughts are with all the former employees whose lives have been suddenly disrupted. I sincerely wish them strength and resilience in navigating this transition and finding new opportunities that match their talents and expertise.
Let’s take a moment to reflect on Skybox Security’s journey and the lessons to be learned.
This article was first published by Help Net Security and can be accessed on their website in International English spelling.
What if I told you that what you may have learned about protecting information and information systems is incomplete? Curious? Then read on.
The inconsistent and incomplete definitions of essential properties in information security create confusion within the InfoSec community, gaps in security controls, and may elevate the costs of incidents.
In this article, I will analyse the CIA triad, point out its deficiencies, and propose to standardize the terminology involved and expand it by introducing two additional elements.
In this edition of the Cyber Insights blog, I want to cover the often-overlooked topic of business cybersecurity external posture, written mainly for business executives.
Over the past 12 months, I have had several discussions with business leaders and small startups about the image their organisations are portraying to potential attackers, usually cybercriminals seeking ransom money.
The topic of “best practices in IAM” is complex due to the intricacies of Identity and Access Management (IAM) and the unique policies, processes, and procedures of each organisation. Therefore, a one-size-fits-all approach does not work.