Greetings, friends! The war with Iran is a stark reminder that long-assumed boundaries between cyber operations and kinetic warfare are rapidly dissolving. George V. Hulme explores how:
-- As Iranian drones were taking out Amazon's data centers in the Gulf, Tehran's hackers were already inside U.S. banks, airports, and defense networks, having gotten there weeks before the first missile flew.
-- The conflict arrives at a precarious moment for U.S. cyber defenses, when staffing shortages, aging infrastructure, and economic pressures are already stretching many organizations thin.
I explored how the wall between cyber and kinetic warfare continues to crumble with digital reconnaissance, disruption, and influence operations becoming deeply intertwined with traditional military strategy, and compiled a list of reliable places to track cyber activity tied to the conflict. I'll update that list regularly, so if you use any that deserve mention, email me at bill@cscgroupllc.com.
Elsewhere, George highlights a troubling trend in the healthcare sector, where new Health-ISAC data shows ransomware and supply chain attacks continuing to escalate across hospitals and healthcare providers. We also explore the future of cybersecurity work through a new FollowFriday list featuring five voices examining how AI will reshape the profession — for better and for worse. We also spotlight five cybersecurity PR professionals who consistently get it right.
We also have two new podcast episodes to share: a CYBR.HAK.CAST with Cyber Distortion podcast hosts Kevin Pentecost and Jason Popillion on AI companions and the strange concept of “cyber immortality,” and a CYBR.SEC.CAST interview with Sightline Security's Kelley Misata, whose journey from cyberstalking victim to cybersecurity leader is helping to enable the work of security nonprofits.
As always, thanks for reading — and for being part of this community.
— Bill Brenner, VP / Editor-in-Chief, CYBR.SEC.Media
ARTICLES



BLOGS




PODCASTS


