Red Alert: CISA’s Budget Cuts & What They Mean for Cyber Defenders

In this week’s episode of Cyberside Chats, @sherridavidoff and @MDurrin break down the real-world impact of CISA’s dramatic budget cuts—including ISAC support reductions, the near-shutdown of the CVE program and its implications, and layoffs that could weaken the front lines of U.S. cyber defense.

What does this mean for your organization? Watch this week’s episode to find out and get expert advice on what to do next.

🎥 Video: https://youtu.be/xEKVdxlCUw0
🎧 Podcast: https://www.chatcyberside.com/e/cisa-funding-cuts-what-does-it-mean-for-our-cybersecurity/

Listen now to learn how to adapt your strategy, map your dependencies, and stay resilient—even as federal support scales back.

#Cybersecurity #CISA #ThreatIntel #CVEs #RiskManagement #CybersideChats #Infosec #CISO #CIO #Security #IT

Red Alert: CISA's Budget Cuts and the Fallout for Defenders

YouTube

Register for Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now!

Quantum computing is on the horizon, and it has the potential to revolutionize the way we think about cybersecurity. Join our April 23rd live session where cybersecurity experts @sherridavidoff and @MDurrin will dive into the implications of quantum technology on encryption and data security. Learn what steps security leaders should take today to prepare for this disruptive shift.

Don’t miss out on this opportunity to ask questions and stay ahead of emerging threats. Register now!

https://www.lmgsecurity.com/event/cyberside-chats-live-april25/

#QuantumComputing #Cybersecurity #Encryption #CybersideChats #CISO #infosec #CIO #CEO #Cyberaware #ITsecurity #Riskmanagement #CybersecurityInsights #Tech #Cyber

Cyberside Chats: Live! Quantum Shift: How Cybersecurity Must Evolve Now | LMG Security

In this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

LMG Security

Are Shadow Channels Like Signal Putting Your Organization at Risk?

Unauthorized communication platforms—aka shadow channels—are creating compliance and security nightmares for enterprise and government environments. Recent controversies involving tools like Signal and Gmail in sensitive governmental contexts underscore the extent of these risks.

In this week’s Cyberside Chats, special guest @grl_geek joins @MDurrin to break down:

▪ What platforms like Signal offer—and their limitations in enterprise settings.
▪ Why users bypass official channels, leading to compliance failures.
▪ Real-world implications from recent incidents, including U.S. officials using unsecured communication tools.
▪ The broader shadow IT landscape and why it’s a pressing issue for security leaders.

🎥 Watch the full video: https://youtu.be/XKvY5uxJwJY
🎧 Listen to the podcast: https://www.chatcyberside.com/e/unmasking-shadow-it-navigating-unauthorized-communication-tools/

#CybersideChats #ShadowChannels #UnauthorizedPlatforms #Signal #Compliance #Cybersecurity #Infosec #ShadowIT #ITSecurity

Shadow Channels: The Risks of Unauthorized Communication Platforms Like Signal

YouTube

Are Encryption Backdoors Putting Your Organization at Risk?

In this clip, @sherridavidoff and @MDurrin explain why encryption backdoors are a nightmare for organizations, creating security gaps that cybercriminals can exploit.
Watch this full episode of Cyberside Chats to hear Sherri and Matt break down Apple’s battle against the UK’s demands for backdoor access, the worldwide backlash, and what it all means for cybersecurity professionals.

We'll cover:
▪ Why backdoors are a double-edged sword for security
▪ Historical backdoor failures that left organizations exposed
▪ Pro tips to strengthen your security posture against evolving encryption policies

🎥 Watch the full video: https://youtu.be/5HhNKMIJkCQ
🎧 Listen to the podcast: https://www.chatcyberside.com/e/the-encryption-battle-security-savior-or-cyber-risk/

#Cybersecurity #Encryption #Backdoors #AppleVsUK #ITSecurity #CybersideChats #CISO #Riskmanagement #Infosec #cyber #tech #Infosec #Security #CIO

Encryption Backdoors: Security Savior or Cyber Risk?

YouTube

New Cyberside Chats Episode Alert! This week, @sherridavidoff and @MDurrin dive into scary new examples of AI deepfake scams that cybercriminals are using to look and sound just like trusted brands.

Watch or listen to the full episode to hear a jaw-dropping #Apple help desk deepfake incident, and learn how attackers are using voice clones, #YouTube, and even #Google to trick security teams.

▶️ Watch: https://ow.ly/3h1650Vmymo
🎙️ Listen: https://ow.ly/lsYh50Vmymq

#Deepfakes #Vishing #Cybersecurity #AIThreats #GenAI #CISO #AI #CyberAware #CEO #RiskManagement #VoicePhishing #Infosec #CybersideChats

Deepfakes & Voice Phishing: The New Frontier of Cybercrime

YouTube

What if hackers could track your team’s movements, calls, and even financial activity—without ever breaching your network?

In this clip from our latest episode of Cyberside Chats, LMG’s @sherridavidoff and @MDurrin reveal how nation-state actors are using telecom metadata to launch targeted attacks—and what IT leaders can do about it.

Watch the full video to discover key prevention tactics, including stronger authentication for financial transactions, identifying spoofed calls and texts, and securing third-party telecom providers.

📺 Watch the full episode: https://youtu.be/Lyiwx6upd8E
🎧 Listen to the podcast: https://www.chatcyberside.com/e/the-title-of-cschats_11_-_ep_11_-_03_07_25_final_v2_mp3abb2v/?token=36d8802181f520acca954d7188659807

#Cybersecurity #TelecomSecurity #Metadata #Spoofing #LMGSecurity #CybersideChats #Infosec #NationStateThreats #SecurityAwareness #CISO #hacker #infosec #security #riskmanagement

Cyberside Chats: Wiretapped: How Hackers Infiltrated Global Telecom Networks

YouTube

Join us on March 26th for a live episode of Cyberside Chats! Ask questions as we discuss a controversial cybersecurity topic of 2025—encryption backdoors. Are they essential tools for law enforcement, or dangerous vulnerabilities that invite cybercriminals in?

We’ll break down Apple’s resistance to the UK’s proposed regulations, global reactions, historical backdoor failures, and what IT leaders need to know as encryption policy evolves.

Register now to join the discussion: https://www.lmgsecurity.com/event/cyberside-chat-live-march25/

#CybersideChats #Cybersecurity #Encryption #ITLeadership #CyberRisk #DataPrivacy #Infosec #CISO #ITsecurity

Cyberside Chats: Live! Encryption Backdoors: Security Savior or Cyber Risk? | LMG Security

In this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

LMG Security

The recent Microsoft Outlook outage left thousands scrambling. But it wasn’t just a fluke—recent outages from CrowdStrike, AT&T, and UK banks prove that business interruption is one of the biggest risks organizations face today.

Watch the full episode of this week’s Cyberside Chats in which @sherridavidoff and @MDurrin break down the latest Microsoft outage and share practical advice to reduce your downtime and risk!

🎧Listen here: https://www.chatcyberside.com/e/navigating-tech-turbulence-microsoft-outages-and-business-interruption-preparedness/?token=c49ed52268497cfbfb8b8974dd5e1901
🎥 Watch here: https://youtu.be/n5V2aL8XG7k

#cybersecurity #cyberinsurance #businesscontinuity #CybersideChats #microsoft #microsoftoutage #cyberaware #businesscontinuityplanning #businesscontinuity #LMGsecurity

When Microsoft Goes Down: Cyber Risk & Resilience | Cyberside Chats: Cybersecurity Insights from the Experts

The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps to help organizations reduce the risk of business disruption. Join Sherri Davidoff and Matt Durrin as they discuss the broader implications of such outages, emphasizing the importance of effective risk management, especially for organizations heavily reliant on cloud services. Actionable Takeaways: Develop a Communications Plan – Ensure employees have backup communication methods for cloud service outages. Strengthen Vendor Risk Management – Assess dependencies on critical providers and establish alternative solutions. Test Business Continuity Plans (BCP) – Run outage simulations to improve response time and decision-making. Evaluate Cyber Insurance Coverage – Confirm policies include business interruption coverage, not just cyberattacks. Monitor for Early Warnings – Set up alerts for vendor status updates and cybersecurity advisories. Reduce Single Points of Failure – Implement multi-cloud or hybrid infrastructure to avoid total reliance on a single provider. Links & References: Microsoft’s Global Outage Coverage (CNBC) Cyber Insurance Report – Business Interruption Trends (AM Best) CrowdStrike Q4 2025 Earnings Report UK Banking System Outage (The Times) World Economic Forum Cybersecurity Outlook 2025 #microsoft #microsoftoutage #cybersecurity #cyberaware #businesscontinuityplanning #businesscontinuity #cyberinsurance #LMGsecurity #CybersideChats

If you think your old cloud storage is harmless, think again!

In this week's Cyberside Chats episode, Sherri Davidoff and Matt Durrin dig into the newly uncovered dangers of abandoned S3 buckets and how to protect your organization. They explain how hackers can take over abandoned Amazon S3 buckets to deliver malware-laced updates, compromised VPN configurations, and more—then share actionable strategies to defend against this overlooked risk.

🎧 Listen here: https://www.chatcyberside.com/e/exploring-the-digital-debris-the-hidden-dangers-of-abandoned-s3-buckets
🔗 Watch here: https://youtu.be/I_tQN50szZk

#Cybersecurity #CloudSecurity #AWS #DataProtection #RiskManagement #S3Buckets #Cloud #CISO #Infosec #DFIR #databreach #CybersideChats

Abandoned S3 Buckets – A Goldmine for Hackers | Cyberside Chats: Cybersecurity Insights from the Experts

Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat! Links & Resources:  Watchtowr’s Research on Abandoned S3 Buckets: https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/  How Encryption Works by Sherri: https://www.youtube.com/watch?v=ALsXbShTWJk  LMG Security’s Cloud Security Audits: https://www.LMGsecurity.com/services/advisory-compliance/cloud-security-assessment/  Like what you heard? Subscribe to Cyberside Chats for more expert cybersecurity insights every week.  #cybersecurity #databreach #AWS #S3 #CISO #Cloud #AWSsecurity #Hackers #Infosec #IncidentResponse  

Check out this week's new Cyberside Chats Episode: Unmasking the Ghost Ransomware Threat!

In today’s episode, our cybersecurity experts @sherridavidoff and @MDurrin dive into the latest ransomware trends and the new CISA/FBI alert on Ghost Ransomware. They cover:

▪ Changing tactics with rising attacks and more data leaks
▪ Falling ransom payments as victims fight back
▪ RansomHub’s rise and its “ethical” branding

You'll also hear practical tips to protect your organization, from patching known vulnerabilities to implementing strong backups and testing incident response plans.

Listen here: https://www.chatcyberside.com/e/unmasking-the-ghost-ransomwares-global-threat/?token=76afcf8b904925d9ca1aa4ecfe150d81

Watch here: https://youtu.be/eDgbNRpxgPI

Do you have any specific topics you'd like us to discuss? Please let us know in the comments!

#CybersideChats #Cybersecurity #Ransomware #GhostRansomware #Infosec #DFIR #CISO #Infosec #cyber #security #IT #riskmanagement #cyberaware #incidentresponse

Ransomware Watch: Ghost, RansomHub, and the Latest Trends | Cyberside Chats: Cybersecurity Insights from the Experts

In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can fortify their defenses. We'll also provide insights into the broader ransomware landscape, including trends and statistics for 2024, and offer practical advice on protecting against these cyber threats. Lastly, we delve into the operations of the RansomHub group, revealing their so-called 'ethical' hacking practices. Join Sherri Davidoff and Matt Durrin as they unravel these cyber threats and equip you with strategies to safeguard your organization.