James Chillingworth
@jchilliplanet
Followers
3K
Following
19K
Media
1K
Statuses
12K
CEO of The Consulting Practice https://t.co/NBdp5Ov4QW Actor - https://t.co/5Ml74x8a7k Bachelor of Mathematics - University of Waterloo
Toronto and Los Angeles
Joined February 2011
Cybersecurity News. 📰 Just in time for Christmas and the New Year, the Cybersecurity Almanac is released! Get some eggnog and have a read.... Stay Secure, Stay Safe! Cheers, Chilli. 🌶️ https://t.co/7gW69nUQ9Y
#Cybersecurity #Infosec #Appsec #ITSecurity
cybersecurityventures.com
The past, present, and future of cybercrime. Brought to you by Cybersecurity Ventures and Evolution Equity Partners
0
0
0
IT Security News. 📌 And now another breach with an Artificial Intelligence (AI) Engine - Gemini from Google. Here's what you can do to protect yourself and your organization: Input Sanitization: Filter and sanitize user inputs to remove or escape malicious patterns and
cybersecuritynews.com
A critical zero-click vulnerability dubbed "GeminiJack" in Google Gemini Enterprise and previously Vertex AI Search that let attackers siphon sensitive corporate data from Gmail, Calendar, and Docs...
0
0
0
Cybersecurity News. Some good advice to follow to improve your security posture. To note is that an accurate inventory always comes up as essential, however inventory of both hardware and software components is rarely 100% accurate due to shadow IT, Rogue IT or unknown
microsoft.com
Learn how to strengthen cyber hygiene, modernize security standards, leverage fingerprinting, and more to defend against today’s evolving threats.
0
0
0
Cybersecurity News. NIS2 is now in place in Europe. Seems like this kind of framework will be mandated elsewhere soon as well. Stay Secure, Stay Safe! Cheers, Chilli. 🌶️ What it is: EU Directive (EU) 2022/2555 – the new EU-wide cybersecurity law that replaced the old NIS
linkedin.com
You might think: "Regulations are for big enterprises, not us." But as of 2025, that's no longer true.
0
0
0
IT Security News. Well folks it is that time of the year...yes, Christmas/Holidays, but it's also HAPPY SCAMMER TIME! Beware of cyber threats this time of year that are focused on the holiday's - I mean you are not still believing in SANTA are you? Ho Ho Ho. Stay Secure, Stay
foxbusiness.com
Cybersecurity expert warns AI-powered holiday scams are surging, using cloned voices and fake texts to steal money and personal data from shoppers.
0
0
1
Cybersecurity News. Seems like "outages" with cybersecurity technology is becoming a common occurrence. I'm always a proponent of having multiple or over-lapping tools in case one technology fails to function. From a pure statistical perspective, the amount of protection
bleepingcomputer.com
Microsoft is working to mitigate an ongoing incident that has been blocking access to some Defender XDR portal capabilities, including threat hunting alerts.
0
0
0
IT Security News. A good article on how Cyber Awareness sometimes hits the main page of large media organizations. Interesting as this automotive plant was shuttered for about 4 weeks - that's a big deal! Here’s the Top 10 ways manufacturers can prevent cyber attacks
computerweekly.com
Big news stories can shift attitudes. There’s no doubt that insurance vendors and brokers are using major cyber attacks to promote their products, but can security teams also use it to help their b...
0
0
0
IT Security News. Don't forget about Mobile Security, which is probably one of the most used messaging mechanisms used by most people on a daily basis. Some steps to follow: Always update OS and apps immediately Use strong passcode (6–12 digits or alphanumeric) + biometrics
cybersecuritydive.com
The agency’s rare warning about spyware activity comes as it updated mobile security guidance to reflect evolving threats.
0
0
0
Cybersecurity News. Some excellent advice in this article on how your cybersecurity framework might be lacking. I also think that for the framework to be effective, your Sr. Leadership/Board of Directors should understand what your cybersecurity focus/framework is all about -
csoonline.com
Is your organization’s cybersecurity framework able to withstand a new generation of sophisticated attackers? If it isn’t, it’s time to rethink and redesign your approach to cyber risk.
0
0
1
Cybersecurity News. Always interesting to see what other CISO's are saying about the future of Cybersecurity. Seems like budgets will need to increase as malicious attacks intensify. "Show me the money" - lol. Here are some Key Principles for a Healthy 2025–2026 Cybersecurity
itsecurityguru.org
As global economic pressures increase and budgets across both public and private sectors are cut, Anthony Young, CEO at Bridewell, a company that provides cyber
0
0
1
IT Security News. Is it time to switch to a Private Cellular Network? Maybe, but there are some disadvantages including: Very high initial cost – Expensive spectrum, base stations, core network, and installation (often millions of dollars). Spectrum challenges – Need to
0
0
1
IT Security News. Here's the latest OWASP Top 10 for 2025. Have a look as there are always some changes in focus. Stay Secure, Stay Safe. Cheers, Chilli. 🌶️ https://t.co/iHZsyhZ30w
#ITSecurity #Infosec #Appsec #Cybersecurity
0
0
0
IT Security News. Seems like Active Directory (AD) is a primary attack vector. AD has been around for years, and it is a shame that it is not more ruggedized when deployed....and the beat goes on.....what me worry..... Stay Safe, Stay Secure! Chilli. 🌶️
thehackernews.com
Active Directory remains attackers’ top target as 88% of breaches involve stolen credentials
0
0
0
Cybersecurity News. Now "connected" vehicles could be hacked. This seems like a natural progression in the cybersecurity space. Maybe "oversight" vehicle software could be deployed as a separate component? My 2 cents. What me worry. Stay Secure, Stay Safe! Cheers, Chilli. 🌶️
0
0
1
Cybersecurity News. So you don't just have to pay attention to what Cybersecurity technology you currently have in place, now you also need to monitor who is acquiring who in the cyber space. The Acquiring company may not fit in with your Cyber Strategy or maybe it does, and
securityweek.com
Significant cybersecurity M&A deals announced by Jamf, LevelBlue, Ping Identity, Twilio, and Veeam Software.
0
0
0
IT Security News. It will be interesting to see what the repercussion of this exposure will be. Stay Secure, Stay Safe. Cheers, Chilli. 🌶️ https://t.co/b79YyByZ1s
#ITSecurity #Infosec #Appsec #Cybersecurity
cybersecuritynews.com
Over 500GB of China’s Great Firewall data leaked, exposing internal code, logs, and manuals revealing its vast surveillance operations.
0
0
0
Cybersecurity News. A good discussion about the evolution of Artificial Intelligence to "Agentic AI", which basically means having a pre-programmed agent do AI work for you without needing your input - smells like DANGER, if this is not managed properly. Recall that request in
1
0
1
Cybersecurity News. Another Day, another breach. This time with GMAIL accounts. What can you do? 1) Use Multi-Factor Authentication (MFA), 2) Use complicated or long passwords and change them regularly, 3) Go password-less , 4) Pray. Stay Secure, Stay Safe! Cheers, Chilli. 🌶️
tipranks.com
Just a week after an AWS ($AMZN) outage left millions of websites unresponsive, another major tech disruption has surfaced, this time involving a massive leak of Gm...
0
0
1
Check out my latest article: The Rise of AI and Its’ Impact on Vulnerability Management https://t.co/gaQXg8uW7F via @LinkedIn
linkedin.com
Explore top LinkedIn content from members on a range of professional topics.
0
0
0
IT Security News. Some best practices to follow after you've been breached courtesy of BITSIGHT. I might add that it could also make sense to ensure you have a BACKUP environment in place as well. Things to consider: Multi Network providers, Multiple Cloud Provider, and
0
0
0