The AI Agent Hype Cycle: When Viral Platforms Are More Human Than They Appear 

Two robotic hands suspended against a black background with puppet strings hanging from their fingers beneath the headline “Autonomous? Or Just Automated?”, symbolizing AI agent security and human-controlled automation.

A supposed social network for autonomous AI agents goes viral. Screenshots of AI conversations spread across LinkedIn and Twitter. Headlines suggest emergent machine behavior. Security professionals panic. Executives ask their CISOs what it means for their organization.  Then researchers look under the hood and find something far more mundane: humans with automation scripts.  The Promise […]

2025 Year in Review: Deepfakes, Quantum Realities, and the AI Governance Gap

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. This Episode: As 2025 draws to a close, Joshua Schmidt takes us on a journey through the year’s most thought-provoking conversations—the episodes that challenged assumptions and revealed just how rapidly cybersecurity is transforming. This isn’t your typical year-end recap. […]

Cybersecurity Highlights of 2025 and IT Security Predictions for 2026

Laptop viewed from above with hands typing on a keyboard, a digital shield and lock icon on the screen, and text reading “2025 Recap + 2026 Outlook” and “Cybersecurity Trends and IT Security Strategy Heading Into 2026,” representing cybersecurity planning and risk management.

Cybersecurity in 2025 marked a turning point for organizations of all sizes. Threats became faster, more targeted, and more disruptive, while leadership teams placed greater emphasis on cybersecurity risk management and resilience. IT security was no longer viewed as a technical concern alone. It became a business priority tied directly to uptime, revenue, and trust.  […]

Warcraft to Warfare: Why Your Next SOC Analyst Might Be an AI Bot

Promotional graphic featuring a portrait of a man wearing glasses and a blue shirt on the left, set against a purple, tech-themed background with binary code and abstract shapes. Large text reads “The Future of AI Security,” with a highlighted callout that says “Solving Alert Fatigue with Edward Wu.”

The Real Talk: A Closer Look: The Irony of Alert Overload Edward Wu spent eight years building AI-powered detection systems that generated millions of security alerts. His penance? Founding DropZone AI to automate the investigation of those same alerts. The reality: Most security teams already have too many alerts. What they desperately need is help […]

Critical Infrastructure: Everything is Connected and Vulnerable

Promotional graphic showing a portrait of a woman with red hair styled in a braid, wearing a dark jacket, set against a blue cityscape background with network connection lines. Large text reads “Hackers Target Infrastructure,” with a highlighted label that says “Lesley Carhart of Dragos.”

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Vulnerability You Can’t Patch Lesley Carhart, technical director of incident response at Dragos, delivers an uncomfortable truth: Industrial control systems are designed to be vulnerable. When someone hits the emergency stop button […]

Red Team Warfare: A Navy Cyber Officer’s Inside Look at Military Offensive Operations

Promotional podcast graphic featuring two men speaking in the foreground, one gesturing and one behind a microphone, set against a dark circuit-board background. Text reads “Military Grade Cybersecurity” and “From Pirates to Hackers.” On the right, U.S. Navy sailors raise an American flag, reinforcing a military cybersecurity theme.

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Continuous Testing Problem Foster Davis, former Naval cyber warfare officer, joins us with a reality check: If you’re only testing annually, you’re essentially not testing at all. Attackers study your infrastructure 24/7—especially […]

St. Paul Cyber Attack: Eric Brown Shares Expert Insights on FOX 9

Cybersecurity expert Eric Brown of IT Audit Labs joined FOX 9 to break down the recent St. Paul cyber attack, explaining how ransomware cripples city systems, the role of the National Guard’s cyber team, and steps individuals can take to protect their data. Learn the motives behind municipal cyber attacks, the high cost of recovery, and why ongoing cybersecurity investment is critical.

Meet Pwnagotchi: The AI Pet That Hunts WiFi Handshakes

Blue Pwnagotchi device with an e-ink screen displaying its signature ASCII face on a dark surface.

Discover Pwnagotchi, the AI-powered security tool that captures WiFi handshakes while learning and adapting over time. Part Tamagotchi, part hacker’s companion—this open-source device is redefining ethical network testing with personality and power.

Microsoft Vulnerabilities: How to Measure Progress With a Growing Code Base

How we got here  In the early days of software development, security was an afterthought. Protocols like HTTP, FTP, and Telnet were created with little to no safeguards, leaving the internet—and its users—wide open to exploitation. Initially, attacks were driven by curiosity or notoriety: defacing web pages, crashing servers, and stealing unreleased content. But as […]

A Year With the Flipper Zero: What I’ve Learned [March 2024 Update]

After a year of hands-on testing, security engineer Cameron Birkland shares what he’s learned about the Flipper Zero—a powerful wireless hacking tool making waves in cybersecurity. From cloning garage remotes to launching BLE attacks, this guide explores Flipper Zero’s capabilities, firmware upgrades, accessories, and why it’s both a valuable learning device and a rising concern for physical security.