Skip to content
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in
Logo-cyber with three tag words 4000w
Home
Services
Fractional CISO – Cybersecurity Leadership
Fractional CTO – Application Development Leadership
Automation
Ransomware Cost Estimator
Customer Success Stories
BUCS: Automation Success
ISSA Cybersecurity
Bear Analytics
Inteleos
MovementX: Automation Transformation
Resources
Publications
Papers
Newsletter
About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
  • Home
  • Services
    • Fractional CISO – Cybersecurity Leadership
    • Fractional CTO – Application Development Leadership
    • Automation
    • Ransomware Cost Estimator
  • Customer Success Stories
    • BUCS: Automation Success
    • ISSA Cybersecurity
    • Bear Analytics
    • Inteleos
    • MovementX: Automation Transformation
  • Resources
    • Publications
    • Papers
    • Newsletter
  • About
Linkedin-in

Welcome to V068: They let the hackers in through the ‘cloud’ – whatever that is.

  • April 23, 2025

Crime: Massive leak exposes the inner workings of top ransomware syndicate Black Basta

Some 200,000 private messages among hacking group members have been revealed

READ MORE

 

News: Australia bans all Kaspersky products on government systems

The Australian government has banned all Kaspersky Lab products and web services from its systems and devices following an analysis that claims the company poses a significant security risk to the country.

READ MORE

 

News: Three Password Cracking Techniques and How to Defend Against Them

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods.

READ MORE

 

Cyber Savvy AI Antics

*** FAKE CYBER NEWS ***

Truth Social post on Association Cyber preparedness…

“Nonprofits and cyber?  TOTAL DISASTER!  EVERYBODY KNOWS IT!!! They’re failing badly – just like everyone who said I coun’t win (which I did, bigly!).  Many people are saying they’ve got the worst cyber plan ever created.  But I think the cybersecurity thing is a HOAX.  Nobody knows what’s going on.  Very unfair!  Some leaders (total losers) didn’t even have a firewall.  Sad!  They let the hackers into their servers (very bad!) through the ‘cloud’ – whatever that is.  While I’m president, hackers won’t every try.  They’d be too scared because they’re just dumb kids.”

 

News: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks..

READ MORE

 

News: Have I Been Pwned adds 284M accounts stolen by infostealer malware

The Have I Been Pwned data breach notification service has added over 284 million accounts stolen by information stealer malware and found on a Telegram channel.

READ MORE

 

AI: Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content.

READ MORE

 

AI: 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication.

READ MORE

 

Ransomware: The New Ransomware Groups Shaking Up 2025

In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023.

READ MORE

 

News: Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware.

READ MORE

 

News: Microsoft confirms it’s killing off Skype in May, after 14 years

Microsoft has confirmed that the Skype video call and messaging service will be shut down in May, 14 years after replacing the Windows Live Messenger.

READ MORE

 

News: Over 49,000 misconfigured building access systems exposed online

Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and physical security in critical sectors.

READ MORE

 

AI: ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma Stealer and Vidar Stealer.

READ MORE

 

News: FBI warns Gmail, Outlook email users of costly ransomware scheme

Federal agencies are warning Gmail and Outlook email users of a costly ransomware scheme that has already affected more than 300 victims.

READ MORE

 

News: Microsoft Warns of New StilachiRAT Malware

Microsoft has shared details on StilachiRAT, an evasive and persistent piece of malware that facilitates sensitive data theft.

READ MORE

 

News: Google Releases Major Update for Open Source Vulnerability Scanner

Google has integrated OSV-SCALIBR features into OSV-Scanner, its free vulnerability scanner for open source developers.

READ MORE

 

Vulnerability Vortex

Hackers abuse WordPress MU-Plugins to hide malicious code

Hackers are utilizing the WordPress mu-plugins (“Must-Use Plugins”) directory to stealthily run malicious code on every page while evading detection.

READ MORE

 

Apple issues fixes for vulnerabilities in both old and new OS versions

The company released a host of security patches Monday, including ones that address two zero-day vulnerabilities.

READ MORE

 

Microsoft warns of critical flaw in Canon Printer Drivers

Microsoft’s offensive security team discovered a critical code execution vulnerability impacting Canon printer drivers.

READ MORE

 

Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities

Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities.

READ MORE

 

Google addresses 2 actively exploited vulnerabilities in security update

Serbian security services exploited one of the actively exploited vulnerabilities to break into the phone of a youth activist in Serbia, according to Amnesty International.

READ MORE

 

Malicious VSCode extensions infect Windows with cryptominers

A set of ten VSCode extensions on Microsoft’s Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer for Monero.

READ MORE

 

Critical FortiSwitch flaw lets hackers change admin passwords remotely

Fortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely.

READ MORE

 

Hackers exploit WordPress plugin auth bypass hours after disclosure

Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after public disclosure.

READ MORE

 

SonicWall Patches High-Severity Vulnerability in NetExtender

SonicWall has released fixes for three vulnerabilities in NetExtender for Windows, including a high-severity bug.

READ MORE

 

CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

READ MORE

 

 

Read also

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

Read newsletter

Welcome to v066 : Jibber Jabber Cyberwocky

Read newsletter

Welcome to v065 : Just when you thought it couldn’t get crazier…

Read newsletter

Welcome to v064: A cybersecurity pro and a business executive walk into a bar….

Read newsletter

Welcome to v063: I can remember all my passwords!

Read newsletter

Welcome to v062 : Roses are red, violets are blue, cyber-hackers are waiting for you

Read newsletter

Welcome to v061 : New Year’s Resolution: Strengthen Cybersecurity, Protect Missions.

Read newsletter

Welcome to v060 : Dashing through the net, in a cloud-based CMS

Read newsletter

Welcome to v059 : It’s Cyber Budget Time

Read newsletter

Welcome to v058 : Cyber Fright Night

Read newsletter

Welcome to v057 : Happy Cybersecurity Awareness Month!

Read newsletter

Welcome to v056 : What is your Neurocyberpathology?

Read newsletter

Welcome to v055: It’s Time to Get Cyber-tastic!

Read newsletter

Welcome to v054 : How to Phish an Association Exec

Read newsletter

Welcome to v053 : Hot Out of the Oven: American Phish Pie

Read newsletter

Welcome to v052 : Quantum Toaster Breaches: Coffee Appoints New CIO

Read newsletter

Welcome to v051: Be thankful you’re not Crowdstrike!

Read newsletter

Welcome to v050 : We’re at v050 and kicking cyber-ass!!!

Read newsletter

Welcome to v049 : Watch Over Your Tech

Read newsletter

Welcome to v048 : BEC is DOA

Read newsletter

Welcome to v047 : Insurance Future: Coverage Linked to Cyber Hygiene

Read newsletter

Welcome to v046 : One Phish, Two Phish, Red Team, Blue Team

Read newsletter

Welcome to v045 : Quantum Humor: Relatively Fun, Universally Secure

Read newsletter

Welcome to v044 : Tongue Twisting Today’s Top Tech Terms

Read newsletter

Welcome to v043 : Where Firewalls Whisper and Passwords Giggle

Read newsletter

Welcome to v042 : Swap Suits for Codes and Be Heroes

Read newsletter

Welcome to v041 : Sweet Security Insights, Slice by Slice

Read newsletter

Welcome to v040 : Staff slip, skip strict security steps

Read newsletter

Welcome to v039: Rockin’ Cyber News

Read newsletter

v038: Choose Your CyberNews

Read newsletter

v037: Cybercrime is as Cybercrime Does

Read newsletter

v036: News You Can’t Refuse

Read newsletter

v035: Have Some Views of Cyber-News

Read newsletter

v034: The Double-Edged Sword in 2024 Cybersecurity Landscape

Read newsletter

v033: Cyber News to Use so You Don’t Lose

Read newsletter

v032: Cybercrime all the time

Read newsletter

V031: Cyber News for Chews

Read newsletter

V030: Cybercrime is a Tasty Wave

Read newsletter
About Us
businessman developing strategic plans, evaluating technology

Developing cybersecurity plans, evaluating and implementing technology, building effective software, and executing strategic initiatives.

Let’s Socialize

Popular Post

Welcome to V067: THIS. IS. MARCH CYBER MADNESS

April 3, 2025

Welcome to v066 : Jibber Jabber Cyberwocky

March 19, 2025
About

Reduce cybersecurity risk, maintain compliance, develop strategic plans, and create custom software.

Services
  • Fractional CISO – Cybersecurity Leadership
  • Fractional CTO – Application Development Leadership
  • Automation
  • Ransomware Cost Estimator
Quick Links
  • Latest Publications
  • Testimonials
  • Customer Use Cases
Logo-cyber with three tag words 4000w

Do you want a free sketch for your homepage? Visit Weblify.se

Linkedin-in

Why you need a vCIO?

While CEOs and presidents grapple with the complexities of business, marketplace, industry, strategy, and their board and stakeholders, they are left with little time or inclination to deal with the details of the incredibly dynamic technology landscape. Keeping one’s eye on the myriad of technology changes and how they can and will affect the business takes a specialized, dedicated, and experienced professional. That is exactly the role of the virtual CIO or CTO.
Download

20 Years of CIO Experience

Tracks trends, market direction and customer needs to plan the future of technology.  Recruits high performing team members and develops their skills by providing decision-making ownership and collaborative engagement.  Able to initiate culture change, lead by example, and get buy-in at all levels.  Known for facilitating energizing brainstorming sessions that generate actionable insights and create new revenue opportunities.

In 2000, Brian was introduced to the exhibitions and events industry when he joined 3rd Millennium Communications as Manager of Software Development for a Virtual Tradeshow Product.  That company was acquired by Galaxy Information Services and through additional acquisitions later became Experient.

As CIO of Experient, Brian oversaw the replacement and upgrade of every piece of legacy proprietary systems that supported the registration, housing, and lead retrieval services.  He also oversaw the transition from a paper-based and manual business operations to an entirely online and mobile app-based model.  Brian oversaw the strategy and operations of the Experient data center including their recent adoption and migration to cloud-based hosting to enhance availability, reliability, scalability, and recoverability.

Brian led the product development strategy and spearheaded several product concepts including eventBit™ which was granted a US patent in 2019 (Patent Number: US 10,311,267 B2).  He was also instrumental in the evolution of lead retrieval products from hardware-based units to smart phone-based mobile app technology.

Brian oversaw the cyber-security position for Experient including compliance to the Payment Card Industry Data Security Standard (PCI DSS), SSAE-18 SOC 1 Type II, and internal corporate security standards audits. Security scope included a 400-server data center, 700 end user devices, and credit card data environment, and a data center holding thousands of databases of customer data. Under Brian’s leadership, Experient successfully met or exceeded requirements for PCI since its introduction in 2005.

Brian’s business philosophy is rooted in a belief in the power of high performing teams, the necessity of self-disruption, the focus on the client’s perspective, the criticality of speed of change, and the utility of lean and agile development and operational processes.

Brian has the honor of being the first technology professional to participate as a director on the Board of Directors for the International Association of Exhibitions and Events® (IAEE). Organized in 1928 as the National Association of Exposition Managers to represent the interests of trade show and exposition managers, the International Association of Exhibitions and Events® is the leading association for the global exhibition industry. Today IAEE represents over 12,000 individuals in 50 countries who conduct and support exhibitions around the world. Being a data-centric leader, Brian is also proud to serve on the board of CEIR, the Center for Exhibition Industry Research.

Brian also believes that in today’s competitive employee market, the most successful companies must find ways to create enjoyable and engaged workplace environments. No stranger to performance, Brian was frequently seen on stage in front of the Experient organization delivering educational messages (such as not clicking on links within phishing emails) or just poking fun at his peers within the leadership team through music.

Brian is a Tennessee Volunteer at heart and his blood runs deep orange due to his undergraduate studies at the University of Tennessee, Knoxville where he received his Bachelors of Science in Electrical Engineering with Honors.  He also earned a Masters of Science in Technology Management from the University of Maryland Global Campus.  His personal passions include his wife and two sons, music, and fitness.  He is a 30-year veteran of live music performance, a published musical play composer, and a recording studio engineer and producer.  When he’s not in the studio, you’ll find him out on his bike climbing the local hills.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.I agree