In this week’s episode, I am joined by my good old friend Shakel Ahmed, a cybersecurity practitioner with over 20 years of experience across some of the most demanding environments in the industry. We are covering the importance of skills and...
Just over a week ago, on 11 March 2026, a cyberattack brought one of the world’s largest medical device makers to its knees. Stryker – a $25 billion company that manufactures surgical robots, joint implants and emergency equipment...
It has been a little while since my last update episode, and a lot has been happening in the world of cybersecurity. So today I want to catch you up on three things that have been on my radar and, more importantly, should be on yours. First, we are...
In late February 2026, a Meta executive lost her entire email inbox when an AI agent she was using deleted everything despite explicit instructions to confirm before taking action. At the same time, over 40K OpenClaw AI agent instances were found...
Cisco Live is one of the largest networking and security conferences in the world, bringing together thousands of IT and security professionals for a week of learning, innovation, and hands-on experience — and this year, I was there, working as a...
On June 27, 2024, millions of people worldwide suddenly couldn’t access one of the internet’s most popular DNS services—not because of a cyberattack in the traditional sense, but because a single network in Brazil convinced the internet...
On January 17, 2025, the European Union’s Digital Operational Resilience Act — known as DORA — became fully enforceable, fundamentally changing how financial institutions across Europe manage cyber and operational risk. One year into...
After sixty years of password resets, forgotten credentials, and phishing attacks, the authentication landscape is finally shifting — and 2026 marks the tipping point. In this episode, we break down what passkeys actually are, why over a billion...
In Part 1 of this series, we explored why Microsoft is finally saying goodbye to NTLM authentication after more than 25 years of service. We discussed NTLM’s security weaknesses, from relay attacks to weak cryptography, and touched on Kerberos...
Today, we’re diving into a significant announcement from Microsoft that will fundamentally change how Windows handles authentication. In this two-part series, we’ll explore Microsoft’s plan to phase out the NT LAN Manager protocol...

