The UBS Data Leak: A Wake-Up Call for Rethinking Third-Party Risk Management

In June 2024, global financial powerhouse UBS became the latest victim of a cyberattack—not due to a breach in its own defenses, but through a vulnerability in a third-party provider. The leak exposed sensitive employee data after a ransomware group, LockBit 3.0, targeted a third-party vendor that provided HR and payroll services.This incident is just […]

AI Governance: The Cornerstone of Cyber Resilience—Insights from Axios Boston

source: David Fox Photography on behalf of Axios

At the Axios Boston Security roundtable in June 2025, cybersecurity leaders converged to dissect AI’s impact on digital defense. Their verdict was unanimous: without formal governance frameworks, AI adoption amplifies risk rather than mitigates it . The Dual-Edged Sword of AI in SecurityAI models can rapidly process threat intelligence, identify novel malware signatures, and automate […]

Turning Human Vulnerabilities into Strategic Strengths in AI-Driven Cybersecurity

The paradox at the heart of modern cybersecurity is this: even as we deploy the most advanced AI models to detect anomalies in real time, a single voice-cloned phone call can render those defenses moot. The recent Scattered Spider attack on Qantas, which exposed data for up to 6 million customers through a compromised third-party […]

Beyond Perimeter Defense: Lessons from the Qantas AI-Voice Breach

In early June 2025, Qantas Airlines disclosed a major data breach affecting 6 million customers after attackers bypassed multi-factor authentication (MFA) at an outsourced call center using AI-driven voice cloning . This incident underlines a critical truth: even the most advanced network defenses can be undermined through human-targeted AI tactics. The Mechanics of AI-Powered “Vishing” […]

How ChatGPT and Generative AI Tools Are Fueling The Next Generation of Cyber Attacks

Generative AI

*Updated July 2025* Generative AI tools like ChatGPT are becoming increasingly prevalent in our daily lives. ChatGPT, a language model developed by OpenAI, has the ability to generate text based on a prompt, making it an indispensable tool in various industries such as customer service, content creation, and more.  However, as with any technology, the […]

How To Make AI And Cybersecurity Work Together

AI and cybersecurity work together

Making sure your business is protected from cybercrime is more important than ever. But with the vast amount of data and the constantly evolving landscape of threats, it can be difficult to stay ahead of the curve. That’s where AI comes in. Cybersecurity and artificial intelligence (AI) are two of the hottest topics in the […]

Get Ahead of The Curve: How CEOs & Boards Are Bearing Risk Liability

Let’s talk about the future as it relates to employment contracts in the C-suite. Gartner, Inc (“Gartner”) made their top eight cybersecurity predictions for 2022-2023 earlier this year, their 8th prediction on their list was that by 2026 half of C-level executives (Chief Executive Officers, Chief Technology Officers, & Chief Financial Officers) will have employment […]

The Importance of Third-Party Risk Management for Cybersecurity

In the last few decades, cybersecurity has become more and more mainstream for companies of all sizes. A large part of the reason for this rise is the increased frequency of third-party breaches.  Many companies, especially larger multinational corporations, hire cybersecurity firms to protect their own servers and data. This has effectively mitigated many instances […]

The Latest Investments in Advanced Cybersecurity

As we have seen, in the past several years, cybersecurity attacks have risen dramatically and no company or industry is immune to the threats. Robust cybersecurity protocols are needed, and often the simplest solutions can be extremely effective when practiced diligently by everyone in an organization.  Some industries are however in dire need of a […]

How To Minimize the Time to Respond to Cyber Security Threats

Keeping data safe and ensuring network security is safe from threats are on most companies and government entities’ priority lists. Cyber threats and data breaches are becoming more common as cybercriminals find new and unique ways to hack into secure data by invading networks and breaching security vulnerabilities. The best way for companies to protect […]