OAuth Abuse Is the New Phishing: Why “Log In With X” Keeps Burning You

OAuth abuse has quietly become the phishing technique that slips past your MFA, your “security‑aware” users, and your cloud email filters. Recent campaigns abusing OAuth redirects and malicious apps in Microsoft Entra ID and Google Workspace show that “Log in with X” is now one of the easiest ways into your SaaS estate. Phishing Without […]
The New Breach Supply Chain: When Your Data Broker Gets Pwned

When your supply chain gets breached, you inherit its chaos, whether you like it or not. The LexisNexis incident and a wave of third‑party breaches in 2026 are a warning shot for every legal, risk, and engineering leader who leans on data brokers to keep their business compliant and fraud‑resistant. When Your Data Provider Makes […]
MFA Bypass Kits, AI Phishing, and the End of ‘Good Enough’ Authentication

MFA used to be the control that let MSPs and security pros sleep at night. In 2026, industrial‑grade phishing kits and AI email engines have turned “we turned on MFA” into the new “we installed antivirus” — expected, but nowhere near enough. When MFA stops saving you Picture the pattern you’ve seen in too many […]
Inside the Conduent Mega-Breach: What a “Largest in U.S. History” Incident Teaches About Third‑Party Risk

When a contractor you barely name in board meetings leaks Social Security and health data for at least 25 million people, it stops being “their” incident and becomes a referendum on your third‑party risk program. The Conduent breach is exactly that kind of stress test. When your outsourcer becomes the soft underbelly Conduent, a New […]
CMMC by Stealth: How GSA Is Sneaking NIST 800‑171 Into Civilian Contracts

GSA is turning NIST 800‑171 into a de facto requirement for civilian contractors, even without a formal CMMC program — especially anywhere Controlled Unclassified Information (CUI) touches your systems. For small and mid-size firms, that means “good enough IT” is no longer compatible with keeping GSA work. The stealth rollout: CMMC without the brand GSA […]
Compliance Debt Is the New Tech Debt: Surviving 2026’s Layered Cyber Regulations

Compliance debt is the pile‑up of half-implemented controls, untested policies, and missing evidence that builds as new regulations land faster than teams can operationalize them. In 2026, SEC exam priorities, NIS2, and AI-governance rules are turning that debt into a real balance sheet risk for security leaders. What “compliance debt” really is Like tech debt, compliance debt […]
AI Meets Compliance: Using the DOJ’s ECCP as a Security Guardrail

The mandate is everywhere now: “We need to use AI.” Boards want efficiency. Executives want innovation. Vendors are quietly flipping on AI “copilots” in tools you already own. And somewhere in the middle sits security and compliance, being told to adopt AI with little clarity on why, where, or how. Simply saying “no” is no […]
Security Reporting Rules Are Coming for Everyone: How MSPs and vCISOs Prepare Clients for CISA‑Grade Incident Disclosures

The era of “optional” cyber incident reporting is ending, and the operational burden is going to land squarely on managed security providers and vCISOs. CISA is actively refining cyber incident and ransom‑payment reporting rules under CIRCIA, reopening comments, and launching town halls with critical infrastructure sectors to stress‑test what’s realistic. Even if many of your […]
From Alerts to Action: Teaching Execs to Read Cyber Risk Like a Weather Report

Executives are drowning in cyber alerts and starving for decisions. If you want their support, your job isn’t to forward every CVE — it’s to turn threat noise into something they can read like a weather report: clear, comparable, and decision‑ready. What Executives Actually Need (And Don’t) The SOC lives in logs, CVEs, and vendor […]
When Ransomware Becomes a Civic Emergency: What Cities Must Learn from St. Paul

When ransomware hits a city, it stops being an IT story and becomes a public safety problem. In 2025, St. Paul, Minnesota gave us a template for what that escalation looks like. When “IT Outage” Turns into a State of Emergency On July 25, 2025, St. Paul began detecting suspicious activity on its internal networks, […]