After Ransomware How to Rebound to Normal

If you got ransomware – now what?  How can you recover and get back to normal?   Here are some images of ransomware from older posts on this blog: Asking your favorite AI instance “After a confirmed ransomware attack what is a schedule to normality? I.e. step by step instructions to make sure no persistent … Read more

AI Implemented without Governance Concerns

As this story pointed out at the Register: “Enterprises neglect AI security – and attackers have noticed” The findings come from Big Blue’s Cost of a Data Breach Report 2025 report, which shows that AI-related exposures currently make up only a small proportion of the total, but these are anticipated to grow in line with … Read more

Google Claims AI Agent Found Zero Day Vulnerability

Out of a Record.media story where Google “Big Sleep” AI tool found a vulnerability that was not yet uncovered. The white paper referenced by Google discusses how to use AI agents in a hybrid defense in depth approach: Building on well-established principles of secure software and systems design, and in alignment with Google’s Secure AI … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more