The AI Agent Hype Cycle: When Viral Platforms Are More Human Than They Appear

A supposed social network for autonomous AI agents goes viral. Screenshots of AI conversations spread across LinkedIn and Twitter. Headlines suggest emergent machine behavior. Security professionals panic. Executives ask their CISOs what it means for their organization. Then researchers look under the hood and find something far more mundane: humans with automation scripts. The Promise […]
2025 Year in Review: Deepfakes, Quantum Realities, and the AI Governance Gap

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. This Episode: As 2025 draws to a close, Joshua Schmidt takes us on a journey through the year’s most thought-provoking conversations—the episodes that challenged assumptions and revealed just how rapidly cybersecurity is transforming. This isn’t your typical year-end recap. […]
Cybersecurity Highlights of 2025 and IT Security Predictions for 2026

Cybersecurity in 2025 marked a turning point for organizations of all sizes. Threats became faster, more targeted, and more disruptive, while leadership teams placed greater emphasis on cybersecurity risk management and resilience. IT security was no longer viewed as a technical concern alone. It became a business priority tied directly to uptime, revenue, and trust. […]
Warcraft to Warfare: Why Your Next SOC Analyst Might Be an AI Bot

The Real Talk: A Closer Look: The Irony of Alert Overload Edward Wu spent eight years building AI-powered detection systems that generated millions of security alerts. His penance? Founding DropZone AI to automate the investigation of those same alerts. The reality: Most security teams already have too many alerts. What they desperately need is help […]
Critical Infrastructure: Everything is Connected and Vulnerable

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Vulnerability You Can’t Patch Lesley Carhart, technical director of incident response at Dragos, delivers an uncomfortable truth: Industrial control systems are designed to be vulnerable. When someone hits the emergency stop button […]
Red Team Warfare: A Navy Cyber Officer’s Inside Look at Military Offensive Operations

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Continuous Testing Problem Foster Davis, former Naval cyber warfare officer, joins us with a reality check: If you’re only testing annually, you’re essentially not testing at all. Attackers study your infrastructure 24/7—especially […]
St. Paul Cyber Attack: Eric Brown Shares Expert Insights on FOX 9
Cybersecurity expert Eric Brown of IT Audit Labs joined FOX 9 to break down the recent St. Paul cyber attack, explaining how ransomware cripples city systems, the role of the National Guard’s cyber team, and steps individuals can take to protect their data. Learn the motives behind municipal cyber attacks, the high cost of recovery, and why ongoing cybersecurity investment is critical.
Meet Pwnagotchi: The AI Pet That Hunts WiFi Handshakes

Discover Pwnagotchi, the AI-powered security tool that captures WiFi handshakes while learning and adapting over time. Part Tamagotchi, part hacker’s companion—this open-source device is redefining ethical network testing with personality and power.
Microsoft Vulnerabilities: How to Measure Progress With a Growing Code Base

How we got here In the early days of software development, security was an afterthought. Protocols like HTTP, FTP, and Telnet were created with little to no safeguards, leaving the internet—and its users—wide open to exploitation. Initially, attacks were driven by curiosity or notoriety: defacing web pages, crashing servers, and stealing unreleased content. But as […]
A Year With the Flipper Zero: What I’ve Learned [March 2024 Update]

After a year of hands-on testing, security engineer Cameron Birkland shares what he’s learned about the Flipper Zero—a powerful wireless hacking tool making waves in cybersecurity. From cloning garage remotes to launching BLE attacks, this guide explores Flipper Zero’s capabilities, firmware upgrades, accessories, and why it’s both a valuable learning device and a rising concern for physical security.