Iran-Linked Cyber Surges Reward Boring Preparedness

When The Noise Arrives Early During recent U.S. and Israeli escalation involving Iran, security teams watching multiple environments saw something familiar: waves of spam and scanning activity showed up before the headlines fully landed. Whether you call it pre-positioning, opportunistic copycats, or state-adjacent actors moving on a predictable schedule, the operational point is the same. […]

Wearables Make Capture Passive

Wearable AI recording device pin on a suit jacket beside the title “The Rise of Wearable AI Surveillance,” representing cybersecurity risks of wearable AI recording devices.

A phone is an obvious recording device. A wearable pin is engineered to be frictionless and socially normal. That shifts risk in ways many meeting norms and acceptable use policies were never built for. When collection becomes passive, users do not need to decide to “record.” In some homes, automation assistants from Amazon or Google […]

Greyware, Supply Chain Integrity, and Why “New” Network Equipment Must Mean Factory-Sealed

Opened enterprise network switch packaging with headline about supply chain integrity, illustrating cybersecurity and compliance risks.

When your brand-new Cisco switches arrive looking like they’ve been to a few parties without you, it’s not just an unboxing disappointment—it’s a supply chain red flag that could compromise your entire infrastructure. Let me tell you about a recent situation that perfectly illustrates why “trust but verify” isn’t paranoia in cybersecurity—it’s basic operational hygiene. […]

2025 Year in Review: Deepfakes, Quantum Realities, and the AI Governance Gap

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. This Episode: As 2025 draws to a close, Joshua Schmidt takes us on a journey through the year’s most thought-provoking conversations—the episodes that challenged assumptions and revealed just how rapidly cybersecurity is transforming. This isn’t your typical year-end recap. […]

Cybersecurity Highlights of 2025 and IT Security Predictions for 2026

Laptop viewed from above with hands typing on a keyboard, a digital shield and lock icon on the screen, and text reading “2025 Recap + 2026 Outlook” and “Cybersecurity Trends and IT Security Strategy Heading Into 2026,” representing cybersecurity planning and risk management.

Cybersecurity in 2025 marked a turning point for organizations of all sizes. Threats became faster, more targeted, and more disruptive, while leadership teams placed greater emphasis on cybersecurity risk management and resilience. IT security was no longer viewed as a technical concern alone. It became a business priority tied directly to uptime, revenue, and trust.  […]

Warcraft to Warfare: Why Your Next SOC Analyst Might Be an AI Bot

Promotional graphic featuring a portrait of a man wearing glasses and a blue shirt on the left, set against a purple, tech-themed background with binary code and abstract shapes. Large text reads “The Future of AI Security,” with a highlighted callout that says “Solving Alert Fatigue with Edward Wu.”

The Real Talk: A Closer Look: The Irony of Alert Overload Edward Wu spent eight years building AI-powered detection systems that generated millions of security alerts. His penance? Founding DropZone AI to automate the investigation of those same alerts. The reality: Most security teams already have too many alerts. What they desperately need is help […]

Critical Infrastructure: Everything is Connected and Vulnerable

Promotional graphic showing a portrait of a woman with red hair styled in a braid, wearing a dark jacket, set against a blue cityscape background with network connection lines. Large text reads “Hackers Target Infrastructure,” with a highlighted label that says “Lesley Carhart of Dragos.”

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Vulnerability You Can’t Patch Lesley Carhart, technical director of incident response at Dragos, delivers an uncomfortable truth: Industrial control systems are designed to be vulnerable. When someone hits the emergency stop button […]

Spyware Campaigns Targeting Messaging Apps: What IT Audit Teams Need to Know 

CISA has issued a new warning about active spyware campaigns targeting messaging apps like Signal and WhatsApp. High-value users are being hit with device exploits, fake apps, and zero-click attacks. Here’s what organizations need to know — and how IT Audit Labs can help strengthen mobile and messaging security.

Red Team Warfare: A Navy Cyber Officer’s Inside Look at Military Offensive Operations

Promotional podcast graphic featuring two men speaking in the foreground, one gesturing and one behind a microphone, set against a dark circuit-board background. Text reads “Military Grade Cybersecurity” and “From Pirates to Hackers.” On the right, U.S. Navy sailors raise an American flag, reinforcing a military cybersecurity theme.

Subscribe to The Audit Brief, where we break down the latest episode of The Audit Podcast. The Real Talk: A Closer Look: The Continuous Testing Problem Foster Davis, former Naval cyber warfare officer, joins us with a reality check: If you’re only testing annually, you’re essentially not testing at all. Attackers study your infrastructure 24/7—especially […]

St. Paul Cyber Attack: Eric Brown Shares Expert Insights on FOX 9

Cybersecurity expert Eric Brown of IT Audit Labs joined FOX 9 to break down the recent St. Paul cyber attack, explaining how ransomware cripples city systems, the role of the National Guard’s cyber team, and steps individuals can take to protect their data. Learn the motives behind municipal cyber attacks, the high cost of recovery, and why ongoing cybersecurity investment is critical.