<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>joyce-cyber-vqkkn</title>
    <link>https://www.joycecyber.com</link>
    <description />
    <atom:link href="https://www.joycecyber.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Podcast: Emerging AI Threat Landscape</title>
      <link>https://www.joycecyber.com/podcast-emerging-ai-threat-landscape</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What does rapid AI advancement mean for new offense and the defense?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-16+140001.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Nation-state cyber threats have fundamentally changed. It's no longer about espionage—it's about pre-positioning inside critical infrastructure to trigger societal panic when conflicts escalate.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this episode of the AI Proving Ground Podcast, I join WWT's Madison Horn to discuss how AI is compressing the gap between vulnerability discovery and exploitation, why agentic AI changes the attacker's playbook, and how defenders must now leverage AI as a force multiplier just to keep pace.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.wwt.com/video/former-nsa-cyber-director-on-the-emerging-ai-threat-landscape" target="_blank"&gt;&#xD;
      
           Listen to the episode.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           https://www.wwt.com/video/former-nsa-cyber-director-on-the-emerging-ai-threat-landscape
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-16+140001.png" length="691585" type="image/png" />
      <pubDate>Tue, 13 Jan 2026 19:14:05 GMT</pubDate>
      <guid>https://www.joycecyber.com/podcast-emerging-ai-threat-landscape</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-16+140001.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-16+140001.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Infrastructure as a Strategic Target of War</title>
      <link>https://www.joycecyber.com/infrastructure-as-a-strategic-target-of-war</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The environment has changed...
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1768229371561.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infrastructure disruption is no longer a side effect of conflict—it's a deliberate instrument of state power.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recent U.S. government acknowledgments of cyber-enabled operations during military campaigns signal a meaningful shift: power grids, communications networks, and critical systems are now overt targets. For operators, boards, and technology providers, this changes everything.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In our latest piece with WWT, we break down what this means for threat models, resilience planning, and governance—when disruption isn't accidental, it's strategic.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.wwt.com/blog/infrastructure-as-a-strategic-target-of-war" target="_blank"&gt;&#xD;
      
           Read the article I co-authored with World Wide Technology.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://www.wwt.com/blog/infra
          &#xD;
    &lt;/span&gt;&#xD;
    
          structure-as-a-strategic-target-of-war
          &#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1768229371561.jpg" length="53994" type="image/jpeg" />
      <pubDate>Mon, 05 Jan 2026 16:04:42 GMT</pubDate>
      <guid>https://www.joycecyber.com/infrastructure-as-a-strategic-target-of-war</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1768229371561.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1768229371561.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Navigating the cyber front line in a shifting world order</title>
      <link>https://www.joycecyber.com/geopolitical-risk-navigating-the-cyber-front-line-in-a-shifting-world-order</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Geopolitical Risk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+104800.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybersecurity isn't just shaped by geopolitics anymore—it is the front line where power is projected and contested.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Nation-states are embedding themselves in critical infrastructure. Hyperscalers have become strategic targets. Cybercrime has professionalized into an industry. And agentic AI is introducing risks we're only beginning to understand.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In our latest piece with PwC, we break down the four strategic shifts reshaping cyber risk—and what CISOs need to do right now to lead through it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.pwc.com/gx/en/issues/cybersecurity/navigating-the-cyber-front-line.html" target="_blank"&gt;&#xD;
      
           Read the post I co-authored with PwC here:
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://www.p
          &#xD;
    &lt;/span&gt;&#xD;
    
          wc.com/gx/en/issues/cybersecurity/navigating-the-cyber-front-line.h
          &#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    
          tml
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+104800.png" length="996219" type="image/png" />
      <pubDate>Mon, 15 Dec 2025 15:52:45 GMT</pubDate>
      <guid>https://www.joycecyber.com/geopolitical-risk-navigating-the-cyber-front-line-in-a-shifting-world-order</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+104800.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+104800.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Risky Business #808 -- Insane megabug in Entra left all tenants exposed</title>
      <link>https://www.joycecyber.com/risky-business-808-insane-megabug-in-entra-left-all-tenants-exposed</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Risky Business Podcast
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-22+092339.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On this week’s show Patrick Gray and special guest Rob Joyce discuss the week’s cybersecurity news, including:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Secret Service raids a SIM farm in New York
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            MI6 launches a dark web portal
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Are the 2023 Scattered Spider kids finally getting their comeuppance?
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Production halt continues for Jaguar Land Rover
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            GitHub tightens its security after Shai-Hulud worm
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This week’s episode is sponsored by Sublime Security. In this week’s sponsor interview, Sublime founder and CEO Josh Kamdjou joins host Patrick Gray to chat about the pros and cons of using agentic AI in an email security platform.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://youtu.be/xn63oyBFLW4" target="_blank"&gt;&#xD;
      
           Watch on Youtube:
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           https://youtu.be/xn63oyBFLW4
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-22+092339.png" length="1648155" type="image/png" />
      <pubDate>Wed, 24 Sep 2025 14:27:13 GMT</pubDate>
      <guid>https://www.joycecyber.com/risky-business-808-insane-megabug-in-entra-left-all-tenants-exposed</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-22+092339.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-22+092339.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Victim Notification Working Group</title>
      <link>https://www.joycecyber.com/cyber-victim-notification-working-group</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Adding detail to the concepts of the Cyber Safety Review Board
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/AmberAlertReport_Rectangle-1-1024x576.jpg.webp"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I was part of the working group on victim notification processes that was lead by Rob Knake sponsored by the Institute for Security and Technology (IST).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Timely victim notification is essential after cyber incidents, but today’s systems fall short. Companies often have only a single email address to reach victims, leaving messages distrusted or overlooked. Many recipients can’t tell a real alert from a phishing lure, and even when they do, they may lack the knowledge to act effectively.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Cyber Safety Review Board (CSRB) recommended that cloud service providers explore an “‘amber alert’ style” system for high-impact incidents, delivered natively through mobile devices. While promising, such a system faces serious hurdles—technology integration, governance, and the need for broad industry cooperation. Given these challenges, adoption is unlikely unless the scope expands beyond narrow “high-impact” cases to cover a wider range of account compromises.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Some recommendations emerged for near-term actions while larger efforts are developed: Providers should refine current notification practices, develop middleware for private cross-platform delivery, and strengthen post-notification support. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Download the full report here:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
           https://securityandtechnology.org/wp-content/uploads/2025/08/Amber_Alert_Report-08-25.pdf
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/AmberAlertReport_Rectangle-1-1024x576.jpg.webp" length="47760" type="image/webp" />
      <pubDate>Mon, 25 Aug 2025 17:06:05 GMT</pubDate>
      <guid>https://www.joycecyber.com/cyber-victim-notification-working-group</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/AmberAlertReport_Rectangle-1-1024x576.jpg.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/AmberAlertReport_Rectangle-1-1024x576.jpg.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Managing the Cyber Risks for AI Agents</title>
      <link>https://www.joycecyber.com/managing-the-cyber-risks-for-ai-agents</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Plan for security in your sprint to deploy.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Gemini_Generated_Image_8238sd8238sd8238.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            AI is advancing at an unprecedented pace and being deployed rapidly at scale. With breakthrough innovation comes new threats, evolving risks, and greater responsibilities. In this paper, we dive into how organizations can effectively harness the power of autonomous AI agents while managing cyber risk, trust, and resilience.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I was a contributing author to this PwC piece on Managing the Cyber Risks for AI Agents.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://explore.pwc.com/autonomous-ai-in-cyber/ai-control"&gt;&#xD;
      
           https://explore.pwc.com/autonomous-ai-in-cyber/ai-control
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Gemini_Generated_Image_8238sd8238sd8238.png" length="2208339" type="image/png" />
      <pubDate>Sat, 23 Aug 2025 14:59:44 GMT</pubDate>
      <guid>https://www.joycecyber.com/managing-the-cyber-risks-for-ai-agents</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Gemini_Generated_Image_8238sd8238sd8238.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Gemini_Generated_Image_8238sd8238sd8238.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>OpEd - HPE and Juniper Part 2</title>
      <link>https://www.joycecyber.com/oped-hpe-and-juniper-part-2</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is a subtitle for your new post
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           America’s contest with China isn’t just about troops, ships, and weapons—it’s also about control of digital infrastructure. The recent approval of HPE’s acquisition of Juniper Networks marks more than a corporate merger; it represents a strategic win in the battle for secure, trusted communications. For years, Huawei has dominated the global telecom market, embedding its equipment into critical networks worldwide despite the risks of espionage and disruption. By combining scale, R&amp;amp;D strength, and a secure supply chain, the new HPE-Juniper entity offers allies a viable American-made alternative. Every customer it draws away from Huawei is not only a market gain but a national security advantage.  I wrote a follow up OpEd on why this is important merger to allow.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Full OpeEd here:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/3500592/strategic-win-against-china-digital-empire/"&gt;&#xD;
      
           https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/3500592/strategic-win-against-china-digital-empire/
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png" length="21511" type="image/png" />
      <pubDate>Sat, 16 Aug 2025 14:02:33 GMT</pubDate>
      <guid>https://www.joycecyber.com/oped-hpe-and-juniper-part-2</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>AI agents: Your next insider threat?</title>
      <link>https://www.joycecyber.com/ai-agents-your-next-insider-threat</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is a subtitle for your new post
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ChatGPT+Image+Sep+6-+2025-+03_44_17+PM.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Autonomous AI agents are no longer theoretical. 79% of senior executives say AI agents are already being adopted in their companies. They are already shaping the cybersecurity landscape in profound ways, and I had the opportunity to contribute to PwC’s latest publication on this subject: "The Rise of Autonomous AI in Cybersecurity." In the report, we examine the emergence of AI agents that act independently, making decisions and taking action in complex environments without direct human oversight. My contribution focused on a particularly urgent dimension:  AI as an insider threat. These agents are often granted extensive permissions and access to sensitive infrastructure, yet they operate without the human intuition that typically governs trust and judgment. If misaligned, misconfigured, or compromised, they could become the ultimate insider threat. Unlike human insiders, they do not tire, they do not hesitate, and they do not break protocol because they were never designed to question it. They can operate across systems with perfect recall, adapt in real time, and escalate damage with machine speed. Their ability to persist silently inside networks makes them a uniquely challenging risk class. Organizations that have matured their programs to handle traditional insider risk must now expand their thinking to include autonomous systems that could, by design or by breach, turn inward. The report provides guidance for boards, CISOs, and technology leaders on implementing AI agents with appropriate constraints, monitoring, and contingency controls. As these technologies scale, managing their potential as both protector and threat becomes central to cyber resilience.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Read the document here:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
           https://explore.pwc.com/autonomous-ai-in-cyber/ai-ai-agents
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ChatGPT+Image+Sep+6-+2025-+03_44_17+PM.png" length="1592612" type="image/png" />
      <pubDate>Mon, 11 Aug 2025 19:47:34 GMT</pubDate>
      <guid>https://www.joycecyber.com/ai-agents-your-next-insider-threat</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ChatGPT+Image+Sep+6-+2025-+03_44_17+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ChatGPT+Image+Sep+6-+2025-+03_44_17+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Agents of change: The rise of autonomous AI in cybersecurity</title>
      <link>https://www.joycecyber.com/agents-of-change-the-rise-of-autonomous-ai-in-cybersecurity</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Agents of Change: The Rise of Autonomous AI in Cybersecurity
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+103633.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What happens when AI systems stop waiting for instructions—and start acting on their own?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In our new series with PwC, we explore
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           agentic AI
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            in cybersecurity: autonomous systems that detect threats, coordinate responses, and adapt tactics in real time. No human in the loop.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This isn't just a capability upgrade. It's a fundamental shift in how we design and lead cyber defense—and it raises urgent questions about control, accountability, and what leadership looks like when algorithms become teammates.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.pwc.com/gx/en/issues/cybersecurity/the-rise-of-autonomous-ai-in-cybersecurity.html" target="_blank"&gt;&#xD;
      
           Read this piece that I co-authored at PwC.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           https://www.pwc.com/gx/en/issues/cybersecurity/the-rise-of-autonomous-ai-in-cybersecurity.html
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+103633.png" length="1536494" type="image/png" />
      <pubDate>Tue, 08 Jul 2025 15:44:29 GMT</pubDate>
      <guid>https://www.joycecyber.com/agents-of-change-the-rise-of-autonomous-ai-in-cybersecurity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+103633.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Screenshot+2026-01-15+103633.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>China’s Tech Invasion is a National Emergency</title>
      <link>https://www.joycecyber.com/chinas-tech-invasion-is-a-national-emergency</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China is embedding vulnerabilities into the very technologies Americans depend on. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Originally published in the Washington Examiner —
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.washingtonexaminer.com/restoring-america/courage-strength-optimism/3500592/strategic-win-against-china-digital-empire/?utm_source=chatgpt.com" target="_blank"&gt;&#xD;
      
           read the full piece here
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China is embedding vulnerabilities into the very technologies Americans depend on. Engineers recently found “kill switches” in Chinese-made solar components—evidence of Beijing’s ability to disrupt our energy grid from within. And that’s just one example. From payment terminals to routers and logistics software, Chinese-controlled tech is laced throughout U.S. infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is deliberate pre-positioning. China’s government is backing hackers-for-hire, subsidizing hardware, and embedding tools that could allow them to shut down systems in a crisis. If it were missiles or troops, we’d recognize it as aggression.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What must we do? Cut CCP-linked technology out of critical sectors. Build competitive, secure American alternatives. Reward companies that design resilience into their systems. And map our digital risks as seriously as we would a battlefield.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The bottom line: in cyberspace, the first mover wins. China is already moving. America cannot afford to wait.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png" length="21511" type="image/png" />
      <pubDate>Fri, 06 Jun 2025 14:13:04 GMT</pubDate>
      <guid>https://www.joycecyber.com/chinas-tech-invasion-is-a-national-emergency</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/ea2e413d-f17e-4478-aab4-4f8b3624211f.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Offensive Cyber: NSA Cybersecurity Director Rob Joyce and CIA Director of the Center for Cyber Intelligence Andy Boyd</title>
      <link>https://www.joycecyber.com/offensive-cyber-nsa-cybersecurity-director-rob-joyce-and-cia-director-of-the-center-for-cyber-intelligence-andy-boyd</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is a subtitle for your new post
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/IMG_0741.JPG"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this special edition of the Seriously Risky Business podcast Patrick Gray speaks with former NSA Cybersecurity Director Rob Joyce and former director of the CIA’s Center for Cyber Intelligence Andy Boyd.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The talk about what offensive cyber could look like under Trump 2.0, and the shake-up the intelligence community is going through under various White House initiatives.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://youtu.be/TUgbPlzoCcA" target="_blank"&gt;&#xD;
      
           Watch on YouTube
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
          https://youtu.be/TUgbPlzoCcA
         &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/IMG_0741.JPG" length="165234" type="image/jpeg" />
      <pubDate>Thu, 15 May 2025 14:10:16 GMT</pubDate>
      <guid>https://www.joycecyber.com/offensive-cyber-nsa-cybersecurity-director-rob-joyce-and-cia-director-of-the-center-for-cyber-intelligence-andy-boyd</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/IMG_0741.JPG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/IMG_0741.JPG">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The AI Productivity Revolution: How I Built a Custom App in 30 Minutes</title>
      <link>https://www.joycecyber.com/my-post</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The AI Productivity Revolution: How I Built a Custom App in 30 Minutes
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I had one of those mind-blowing experiences recently when you suddenly realize everything has changed. In less than 30 minutes, I created an iPhone app from scratch. Now that I understand the tools and workflow, I could do it in 15 minutes. The process was surprisingly simple.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           From Programmer to Consumer
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I used to be a decent programmer. As my career evolved, I spent less time coding and became more of a technology consumer. Keeping up with build processes, UI standards, APIs, new frameworks, and evolving languages became impossible since I wasn't programming daily. The scaffolding around any core concept had become more complex than the task itself.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           A Simple Household Problem
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           My wife and I had a grocery shopping dilemma. She uses an app that "feels right" for her workflow—it remembers her favorite items and builds lists from there. The problem? The app is no longer available for me to download, and there's no synchronization between our phones. She doesn’t like to change from something that works well for her and try new things.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In our process today, she emails me the list, but I occasionally miss items or struggle when we need specific things from different stores. Scanning through a full list while shopping requires too much attention and leads to errors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           AI to the Rescue
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I wanted a simple checklist app that would:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Import her emailed list
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Let me cross off items as I collected them
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Include a "hide checked items" option to see what I still needed at other stores
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Previously, I wouldn't have attempted building this myself. The effort-to-reward ratio was too high.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The New Development Process
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I’ve seen the new “vibe coding” revolution where people develop software simply by engaging AI and writing no lines of code. To start this, I described my app idea to ChatGPT o3 pro, including a sample of the email format I receive from my wife. Instead of jumping straight to coding, I used a technique I'd heard about online: letting AI create a robust specification document first.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           With this detailed spec, I moved to Bolt.new—an AI-powered development platform that lets users prompt, run, edit, and deploy full-stack applications directly from a browser. Unlike standard AI coding assistants, Bolt provides a complete environment around the coding process that allowed me to run and debug the product in real-time. You interact live with your prototype in the web browser or deploy it to your phone.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The result? A working app on the first attempt. I prompted it twice more to optimize functionality and had a custom app working with zero manual coding.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Welcome to the Age of Hyper-Specific Software
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We've entered an era where anyone can be their own developer for workflows nobody else wants or needs. The barrier to entry has become absurdly low, while the productivity gains from having tools custom-made for your specific problems are immeasurable.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This revolution is just beginning, and it's already astounding. The ability to quickly create personalized solutions to unique problems represents a fundamental shift in how we interact with technology. No longer are we limited to what's available in app stores or what professional developers think is worth building.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The era of AI-powered personal productivity is here, and it's changing everything.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/DALL-E+2025-03-14+12.40.55+-+A+dynamic+and+powerful+image+of+an+iPhone+showcasing+an+AI+app+widget+on+its+home+screen.+The+widget+symbolizes+power+and+capability-+visually+represe.webp" alt=""/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/DALL-E+2025-03-14+12.40.55+-+A+dynamic+and+powerful+image+of+an+iPhone+showcasing+an+AI+app+widget+on+its+home+screen.+The+widget+symbolizes+power+and+capability-+visually+represe.webp" length="129004" type="image/webp" />
      <pubDate>Fri, 14 Mar 2025 16:47:48 GMT</pubDate>
      <guid>https://www.joycecyber.com/my-post</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/DALL-E+2025-03-14+12.40.55+-+A+dynamic+and+powerful+image+of+an+iPhone+showcasing+an+AI+app+widget+on+its+home+screen.+The+widget+symbolizes+power+and+capability-+visually+represe.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/DALL-E+2025-03-14+12.40.55+-+A+dynamic+and+powerful+image+of+an+iPhone+showcasing+an+AI+app+widget+on+its+home+screen.+The+widget+symbolizes+power+and+capability-+visually+represe.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Select Committee on the Chinese Communist Party Hearing 3/5/2025</title>
      <link>https://www.joycecyber.com/select-committee-on-the-chinese-communist-party-hearing-3-5-2025</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China’s Cyber Threats to Critical Infrastructure &amp;amp; TP-Link Router Risk
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/rob+witness+reduced.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I recently had the honor to testify before the House Select Committee on the Chinese Communist Party to address the growing cybersecurity threats posed by the People’s Republic of China (PRC). As the former Director of Cybersecurity at NSA, I have seen firsthand how Chinese state-sponsored hackers have evolved from stealing intellectual property to preparing for destructive cyberattacks against U.S. infrastructure. The hearing also featured expert testimony from Dr. Emma M. Stewart, Chief Power Grid Scientist at Idaho National Laboratory, and Ms. Laura Galante, former Director of the Cyber Threat Intelligence Integration Center at ODNI. Together, we discussed how China’s cyber operations threaten America’s security, economy, and digital resilience.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           PRC Cyber Campaigns Targeting U.S. Critical Infrastructure
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Chinese hackers have infiltrated vital U.S. infrastructure, including power grids, pipelines, water treatment facilities, and telecommunications networks. Intelligence reports indicate that they have implanted malware within these systems, allowing them to disrupt critical services in times of crisis. A recent campaign, Volt Typhoon, revealed China’s efforts to preposition its cyber capabilities inside U.S. infrastructure, not just for espionage but for potential physical disruption of essential services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beyond infrastructure attacks, Chinese cyber actors steal intellectual property from American businesses, universities, and government agencies. These thefts have fueled China’s rapid advancements in military technology and artificial intelligence, undermining U.S. innovation and economic competitiveness.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber Operations Aimed at Disruption
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China’s cyber strategy has expanded from intelligence gathering to creating societal panic. The FBI and U.S. intelligence community warn that China’s hackers could disable power grids, disrupt emergency services, and paralyze financial institutions to create chaos and weaken America’s ability to respond to geopolitical crises. If tensions escalate over Taiwan or other global conflicts, Beijing could exploit its digital foothold to cause widespread instability.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           TP-Link Routers: A Security Concern
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One overlooked risk is the technology millions of Americans unknowingly rely on. TP-Link, a Chinese manufacturer of Wi-Fi routers.  TP-Link, the world’s largest manufacturer of commercial Wi-Fi and home routers has grown to at least 60% of the U.S. retail market for Wi-Fi systems and SoHo routers compared with about 10% of the market at the start of 2019. This rapid expansion, largely due to below profitable pricing and aggressive market tactics, has raised national security concerns.  Chinese state-backed hackers have previously exploited TP-Link devices in cyberattacks. Worse, TP-Link—like all Chinese companies—is subject to PRC intelligence laws, meaning the Chinese government could compel it to provide backdoor access to American networks through software updates. Given its dominance in the U.S. market, this creates a significant vulnerability in both home and business networks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;h2&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Strengthening U.S. Cyber Defenses
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h2&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To mitigate these threats, the U.S. must take decisive action across three key areas:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            First, we must improve our tools to deter these PRC actions. Deterrence is not just about strengthening cyber defenses—it requires a comprehensive approach that makes clear to Chinese leadership that cyber aggression will have consequences. This means leveraging offensive cyber capabilities to disrupt their operations, economic sanctions, public indictments, international law enforcement actions, and diplomatic pressure. Additionally, export controls and intelligence sharing with allies and private industry must be expanded to limit China’s ability to exploit our technology for cyber operations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Second, we need stronger defenses. The U.S. must make substantial investments in cybersecurity to protect critical infrastructure and private-sector systems. Too many organizations fail to patch known vulnerabilities, making them easy targets for PRC hackers. Regulatory measures should drive stronger security practices in software development and hardware supply chains. Additionally, the U.S. must remove high-risk PRC-controlled technologies, including TP-Link routers, from our networks to close off potential attack vectors.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Finally, assuming our adversaries still come at us, and our defenses improve, we must still plan to be resilient. Cyberattacks will happen despite our best efforts, so we must focus on limiting their impact and ensuring rapid recovery. This includes building in redundancies, strengthening incident response capabilities, and preparing the public and private sectors to operate through cyber disruptions. Reducing our exposure and improving coordination across industries and government agencies will ensure we can withstand and recover from cyberattacks quickly.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China’s cyber strategy represents a long-term, strategic challenge to U.S. security. Strengthening cyber defenses, securing infrastructure, and eliminating high-risk technologies will be critical to protecting national security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You can read my opening statement here: 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://selectcommitteeontheccp.house.gov/media/witness-testimony/witness-testimony-end-typhoons-how-deter-beijings-cyber-actions-and-enhance"&gt;&#xD;
      
           https://selectcommitteeontheccp.house.gov/media/witness-testimony/witness-testimony-end-typhoons-how-deter-beijings-cyber-actions-and-enhance
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1741268522376-9f90346a.webp" length="11754" type="image/webp" />
      <pubDate>Fri, 07 Mar 2025 02:23:31 GMT</pubDate>
      <guid>https://www.joycecyber.com/select-committee-on-the-chinese-communist-party-hearing-3-5-2025</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1741268522376-9f90346a.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/1741268522376-9f90346a.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>China’s drones are its greatest weapon in today’s information warfare</title>
      <link>https://www.joycecyber.com/chinas-drones-are-its-greatest-weapon-in-todays-information-warfare</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           My OpEd for the Hill
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Chinese-Drones_OP_062024_Illustration_CourtneyJonesandAdobeStock.webp"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           China’s drones aren’t just airborne gadgets—they’re a strategic intelligence weapon. In my recent opinion piece for The Hill, I outline how these aerial systems have become embedded within our infrastructure and are increasingly being leveraged as tools for surveillance, data gathering, and asymmetric influence. From hogging the drone marketplace to advancing China’s informational warfare capabilities, these systems present a new kind of threat—one that requires immediate attention and decisive action.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Read the entire article here:
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="/"&gt;&#xD;
      
           https://thehill.com/opinion/national-security/4730109-china-drones-intelligence-weapon/
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Chinese-Drones_OP_062024_Illustration_CourtneyJonesandAdobeStock.webp" length="75570" type="image/webp" />
      <pubDate>Thu, 20 Jun 2024 14:22:02 GMT</pubDate>
      <guid>https://www.joycecyber.com/chinas-drones-are-its-greatest-weapon-in-todays-information-warfare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Chinese-Drones_OP_062024_Illustration_CourtneyJonesandAdobeStock.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/Chinese-Drones_OP_062024_Illustration_CourtneyJonesandAdobeStock.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>60 minutes segment: Ransomware as a threat</title>
      <link>https://www.joycecyber.com/60-minutes-segment-ransomware-as-a-threat</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It takes a hacker to defeat a hacker.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/download.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The 60 Minutes episode spotlighted the growing ransomware crisis, with a focus on the MGM and Caesars casino hacks carried out by the group
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Scattered Spider
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            and their alliance with Russia’s
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           BlackCat
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            gang. It showed how simple social engineering calls to help desks spiraled into multimillion-dollar disruptions, and how young English-speaking hackers are now merging with veteran Russian operators to scale attacks.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            I was interviewed as the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           former NSA Director of Cybersecurity
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            explaining that the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Colonial Pipeline attack
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            was a wake-up call that forced the U.S. to treat ransomware as a serious foreign threat. I truly believe “it takes a hacker to defeat a hacker,” and noted how NSA’s cyber expertise and intelligence functions helped identify key perpetrators. While Russia briefly arrested Colonial Pipeline attackers in 2022, they released them once the Ukraine war began, illustrating how geopolitics shields ransomware gangs. Ransomware is no longer just a business disruption but a
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           state-enabled security challenge
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . By connecting casino heists, Russian safe havens, and the alliance between Western youth hackers and Russian syndicate, you can see that ransomware has evolved into a geopolitical arms race requiring nation-state defenses.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "Sometimes it takes a hacker to defeat a hacker."  See a clip here:
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://youtu.be/lEwC1tN2jb8"&gt;&#xD;
      
           https://youtu.be/lEwC1tN2jb8
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Full episode here:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://youtu.be/zPodxy8zlX0?si=TQ9_fuhuav2JD0Wp"&gt;&#xD;
      
           https://youtu.be/zPodxy8zlX0?si=TQ9_fuhuav2JD0Wp
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/download.jpg" length="6285" type="image/jpeg" />
      <pubDate>Sun, 14 Apr 2024 15:14:47 GMT</pubDate>
      <guid>https://www.joycecyber.com/60-minutes-segment-ransomware-as-a-threat</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/download.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/download.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Safety Review Board - Microsoft Study</title>
      <link>https://www.joycecyber.com/cyber-safety-review-board-microsoft-study</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Report on the Microsoft Online Exchange Incident from Summer 2023.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/csrb-report-on-microsoft.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            I was honored to be part of the US Government Cyber Safety Review Board where we studied the
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Summer 2023 Microsoft Exchange Online intrusion
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . This review examined how a Chinese state-affiliated group, Storm-0558, was able to breach Microsoft systems and access sensitive data. The Board concluded the intrusion was preventable and pointed to Microsoft’s operational and strategic decisions that deprioritized enterprise security as a root cause. I’ve seen significant effort by Microsoft to eliminate tech debt and improve foundational security. As part of its broader strategic response, Microsoft launched the Secure Future Initiative (SFI). This framework was designed to overhaul its security model across the cloud ecosystem, prioritizing robust identity and credential protections, faster patching, and enhanced threat detection capabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           During this study, the CSRB gathered input from 20 organizations, experts, and affected companies. Our findings led to a set of recommendations for both industry and government aimed at strengthening cloud security, transparency, and victim notification. Among them: improving baseline cybersecurity practices for cloud providers, adopting stronger audit logging and identity standards, and updating federal security frameworks to keep pace with evolving threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This report, the third from the CSRB since its founding in 2022, reinforces a critical message—
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           cloud services are core national infrastructure
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Nation-state actors are targeting them aggressively, and both government and industry must raise the bar for security by design.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Read the full document here:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.cisa.gov/sites/default/files/2025-03/CSRBReviewOfTheSummer2023MEOIntrusion508.pdf" target="_blank"&gt;&#xD;
      
           Report on the Microsoft Online Exchange Incident from Summer 2023.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/csrb-report-on-microsoft.png" length="70918" type="image/png" />
      <pubDate>Sat, 06 Apr 2024 17:15:26 GMT</pubDate>
      <guid>https://www.joycecyber.com/cyber-safety-review-board-microsoft-study</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/csrb-report-on-microsoft.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/csrb-report-on-microsoft.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cyber Safety Review Board’s examination of the Lapsus$ attacks</title>
      <link>https://www.joycecyber.com/cyber-safety-review-boards-examination-of-the-lapsus-attacks</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Criminal threats to industry are significant and continue to grow
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2023.08.15-CSRB-reports-on-global-extortion-focused-Lapsus-hacker-group-provides-list-of-recommendations.webp"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CSRB 2nd report.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I was honored to be part of the Cyber Safety Review Board’s examination of the Lapsus$ attacks.   The CSRB reviews significant cyber events, bring together leaders from government and industry, and issue practical, actionable recommendations to strengthen resilience across both the private and public sectors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As part of the Board, I had the opportunity to examine the activities of Lapsus$ and related threat groups. These loosely organized cybercriminals successfully compromised some of the world’s most well-defended companies, using surprisingly low-cost and well-known techniques to exploit weak points in our collective cyber infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What We Found
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Between 2021 and 2022, Lapsus$ carried out extortion-focused attacks against dozens of companies and government agencies worldwide. Their methods exposed critical systemic weaknesses:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Low-Cost Techniques with Big Impact
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – The group used simple tools and social engineering to bypass defenses that organizations believed were strong.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Multi-Factor Authentication (MFA) Weaknesses
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Many implementations relied on SMS and voice-based codes, which proved vulnerable to interception and manipulation.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            SIM-Swapping Risks
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Criminal markets for SIM swaps enabled attackers to hijack phone numbers and gain unauthorized access, often with little resistance from telecom providers.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Exploitation of Third Parties
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Business process outsourcers (BPOs) and downstream vendors were frequent weak links that attackers leveraged to reach larger targets.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Juvenile Cybercrime Dynamics
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Several Lapsus$ members were minors, raising challenges for law enforcement, since lighter penalties and limited intervention programs provided little deterrence
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review Of The Attacks Associate…
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recommendations for a More Secure Future
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The CSRB issued a set of recommendations designed to address these risks and drive long-term improvements across the ecosystem
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Review Of The Attacks Associate…
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           :
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Identity and Access Management (IAM)
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Transition away from SMS/voice-based MFA and move toward phishing-resistant, passwordless authentication (e.g., FIDO2, hardware-backed solutions). Organizations should also strengthen defenses against social engineering.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Telecommunications Resilience
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Treat SIM swaps as privileged actions, enforce stronger identity verification, allow consumers to lock accounts, and require carriers to harden systems and APIs. Regulators should strengthen oversight and reporting.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Managing Vendor and BPO Risk
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Companies should mature vendor risk management, adopt zero trust architectures, and enshrine shared cybersecurity responsibility in contracts with BPOs.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Law Enforcement and Juvenile Crime
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Expand “whole-of-society” programs for juvenile cybercrime prevention, improve international law enforcement cooperation, and strengthen protections against abuse of emergency disclosure requests (EDRs).
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Lapsus$ review underscored how even the strongest organizations can be compromised when attackers exploit human factors, weak authentication, or poorly secured third parties. These aren’t exotic zero-day attacks—they are low-cost, scalable, and repeatable techniques. The CSRB’s findings remind us that building resilience requires not just advanced defenses, but also cultural change, regulatory alignment, and collaboration across government, industry, and law enforcement.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2023.08.15-CSRB-reports-on-global-extortion-focused-Lapsus-hacker-group-provides-list-of-recommendations.webp" length="46202" type="image/webp" />
      <pubDate>Wed, 06 Sep 2023 20:04:45 GMT</pubDate>
      <guid>https://www.joycecyber.com/cyber-safety-review-boards-examination-of-the-lapsus-attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2023.08.15-CSRB-reports-on-global-extortion-focused-Lapsus-hacker-group-provides-list-of-recommendations.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2023.08.15-CSRB-reports-on-global-extortion-focused-Lapsus-hacker-group-provides-list-of-recommendations.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Inagural CSRB Study - Log4j</title>
      <link>https://www.joycecyber.com/inagural-csrb-study-log4j</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cyber Safety Review Board's First Report
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2024.05.07-DHS-CISA-announce-changes-to-Cyber-Safety-Review-Board-membership-.webp"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Inaugural Cyber Safety Review Board
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In February 2022, the U.S. Department of Homeland Security launched the Cyber Safety Review Board (CSRB) to examine major cyber events and provide lessons that strengthen national resilience. The CSRB is a unique public-private partnership—half senior government officials, half leading private-sector experts—created under Executive Order 14028. Its mission is to conduct independent, authoritative reviews of significant cyber incidents, distill insights, and recommend concrete steps to improve cybersecurity for both industry and government.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What Log4j Was and Why It Mattered
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The CSRB’s first review examined the December 2021 disclosure of a critical vulnerability in Log4j, a ubiquitous open-source, Java-based logging library embedded in thousands of software products. The flaw, known as “Log4Shell,” allowed attackers to remotely execute code with little effort, triggering one of the most intense global cybersecurity responses in history. Because Log4j is so deeply woven into the software ecosystem, the vulnerability was not just a one-time crisis but an “endemic” risk—expected to persist in systems for years, if not a decade or more
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The impact was profound: many organizations struggled to even identify where vulnerable code was running, exposing shortcomings in software transparency and asset management. The event also highlighted systemic challenges, including the under-resourcing of open-source projects and the risks created by government policies—such as Chinese vulnerability disclosure rules that could give the PRC early access to flaws for exploitation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Key Findings from the CSRB
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The CSRB’s investigation, informed by nearly 80 organizations and experts, underscored several realities:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Severity:
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Log4j is one of the most serious software vulnerabilities ever discovered.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Endemic Risk:
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Unpatched versions will remain in systems for years, keeping defenders on constant watch.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Transparency Gaps:
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Many companies lacked the ability to quickly locate affected code.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Open-Source Fragility:
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The volunteer-led nature of Log4j reflected broader weaknesses in securing critical open-source projects.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Training Gaps:
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Many software developers have little exposure to secure coding practices as part of formal education
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recommendations for the Future
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The CSRB issued 19 recommendations spanning four categories
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Address Continued Risks of Log4j
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Organizations must assume long-term vigilance, continue reporting exploitation, and regulators should reinforce CISA guidance.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Drive Existing Best Practices
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Invest in capabilities to identify vulnerable systems, maintain accurate IT asset inventories, and strengthen vulnerability response and disclosure programs.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Build a Better Software Ecosystem
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Expand training in secure software development, improve Software Bill of Materials (SBOM) tooling, increase investment in open-source security, and pilot maintenance support for critical projects.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;strong&gt;&#xD;
        
            Invest in the Future
           &#xD;
      &lt;/strong&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             – Explore baseline transparency requirements for federal vendors, evaluate a Cyber Safety Reporting System, create a Software Security Risk Assessment Center of Excellence, and study incentives to embed security into development from the start.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Log4j crisis was a wake-up call: a reminder that the software ecosystem we rely on daily is only as strong as its most under-resourced link. Through the CSRB’s review, we now have a blueprint to address not just Log4j, but systemic weaknesses across open-source software and software supply chains. The work ahead will require vigilance, investment, and collaboration between government and industry to make sure the next “Log4j moment” doesn’t carry the same level of risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2024.05.07-DHS-CISA-announce-changes-to-Cyber-Safety-Review-Board-membership-.webp" length="23266" type="image/webp" />
      <pubDate>Mon, 25 Jul 2022 19:51:38 GMT</pubDate>
      <guid>https://www.joycecyber.com/inagural-csrb-study-log4j</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2024.05.07-DHS-CISA-announce-changes-to-Cyber-Safety-Review-Board-membership-.webp">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/7221a7ef/dms3rep/multi/2024.05.07-DHS-CISA-announce-changes-to-Cyber-Safety-Review-Board-membership-.webp">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
