News

CISO Communication Skills With Kayne McGladrey
Cyvergence

CISO Communication Skills With Kayne McGladrey

In this conversation, Matthew Webster and Kayne McGladrey delve into the complexities of cybersecurity governance, focusing on the role of CISOs in al...
We can’t – and shouldn’t – fix everything
The Industrial Security Podcast

We can’t – and shouldn’t – fix everything

We know there are problems in our security systems, but we can't and shouldn't fix everything. What do we fix? Who decides? How do we explain what's reasonable to people who do decide? Kayne McGladrey, CISO in Residence at Hyperproof, joins us to explore risk, communication, and a surprising role for insurance.
AI shoppers open the door to a world of uncertainty
IT Brew

AI shoppers open the door to a world of uncertainty

“The technology is too immature to actually use its scale successfully and securely right now,” tech expert says.
Cloudflare behind the latest outage to break the internet
Fierce Network

Cloudflare behind the latest outage to break the internet

Cloudflare was behind the latest in a series of outages this year. The big question now is: Why does this keep happening and how do we stop it?
Why Phishing Training Doesn’t Work
IEEE Transmitter

Why Phishing Training Doesn’t Work

Summary: Recent research from the IEEE Computer Society notes that phishing training doesn’t work. The rise of generative AI is making it harder for Research finds that phishing training doesn’t work. What does?
Risk Recalibrated – Aligning Cybersecurity with Business Reality
The Financial Executives Journal

Risk Recalibrated – Aligning Cybersecurity with Business Reality

Today's cybersecurity landscape has reached a critical inflection point. Cyber Risk programs that focus on isolated technical flaws do not adequately protect businesses against today’s complex threats. Treating cyber threats as business risks—measured by impact on revenue, regulatory exposure, and operational continuity—creates a decision framework that executives can act on. This shift moves security from a compliance checkbox to a strategic lever that influences budget allocation and risk appetite. Technical flaws such as an unpatched server or missing multi‑factor authentication are temporary conditions, not risks. They become risks only when they can cause measurable business harm, like delayed payments, fines, or brand damage.
Zero trust isn’t a feature, it’s a philosophy
Spiceworks

Zero trust isn’t a feature, it’s a philosophy

Zero trust is often marketed as a product, but effective implementation means rethinking your security approach from the ground up.
Digital twins are here…and cybersecurity risks are right behind them
IT Brew

Digital twins are here…and cybersecurity risks are right behind them

Digital twins can lead to intellectual property theft and other business risks, according to one CISO.
Securing Smart Water
Water Online

Securing Smart Water

The digital transformation of utilities is necessary and inevitable but also innately vulnerable to bad actors. Its time to discuss prioritizing cybersecurity.
Under siege: Why airlines have been prime targets for cyberattacks
Travel Weekly

Under siege: Why airlines have been prime targets for cyberattacks

Qantas. Hawaiian. WestJet. Air France-KLM. Aeroflot. Each of these airlines has fallen victim to cyberattacks this summer.
How Agentic AI Could Expose Your Most Sensitive Personal Data
Business News This Week

How Agentic AI Could Expose Your Most Sensitive Personal Data

We’ve grown used to our apps asking for permission: to access your location, to view your contacts or to use your microphone. Agentic artificial intelligence flips the script. These systems don’t just ask, they act, blurring the line between assistant and autonomous operator.
Skepticism, Cybersecurity & AI: Leadership Lessons from Kayne McGladrey
Tech Executive Club

Skepticism, Cybersecurity & AI: Leadership Lessons from Kayne McGladrey

In this episode of the Top Innovator Series, we sit down with Kayne McGladrey, CISO-in-Residence at Hyperproof and globally recognized cybersecurity thought ...
Third-Party Risk Management and Risk Concentration in AI: Insights from Black Hat 2025
TheFastMode

Third-Party Risk Management and Risk Concentration in AI: Insights from Black Hat 2025

My conversations with other security leaders at Black Hat 2025 revealed a troubling reality: organizations face dangerous blind spots where AI vulnerability disclosure gaps meet immature risk management frameworks. CISOs privately described how third-party AI adoption creates systemic risks across financial services and critical infrastructure that existing security approaches cannot address.
Catching Up with Kayne McGladrey, IEEE senior member
Dark Reading

Catching Up with Kayne McGladrey, IEEE senior member

Interview with Dark Reading's News Desk at Black Hat 2025
Dark Reading News Desk Is Back at Black Hat
Dark Reading

Dark Reading News Desk Is Back at Black Hat

Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.
Meaningful Momentum or Running in Place: Kayne McGladrey
IEEE

Meaningful Momentum or Running in Place: Kayne McGladrey

AI integration is one of the most significant breakthroughs changing cybersecurity in 2025. What are some of the advantages and challenges? Find out from Imp...
How Agentic AI Could Expose Your Most Sensitive Personal Data
IEEE Transmitter

How Agentic AI Could Expose Your Most Sensitive Personal Data

AI agents represent a fundamental shift from today's permission-based apps to autonomous systems that act independently. Unlike current voice assistants AI agents act autonomously, creating unprecedented privacy and security risks for users.
Local Governments Streamline Remote Access With SASE
StateTech

Local Governments Streamline Remote Access With SASE

Local governments simplify secure remote access with SASE, cutting hardware needs, boosting performance and supporting hybrid work with zero-trust security.
Microsoft SharePoint attack victims face long-term risks
Axios

Microsoft SharePoint attack victims face long-term risks

Schools, hospitals and government agencies are "sitting ducks."
AI, Business Risk & Threat Management: a CISO’s guide
Cyber Sidekicks

AI, Business Risk & Threat Management: a CISO’s guide

This week’s special guest Kayne McGladrey, CISO-in-Residence at Hyperproof, outlines the business challenges that CISO's face, as we discuss new types of risk in daily threat management.