Cyber Risk in 2026: What Security Leaders Need to Pay Attention to Now

Featuring insights from DirectDefense’s fireside chat with Jim Broome, Rick McElroy, and Tim Armstrong Watch the Full Webinar The Reality: Cyber Risk Isn’t Changing – It’s Accelerating Budget cuts. Leaner teams. AI-generated code. Expanding attack surfaces. Cyber risk in 2026 doesn’t look entirely new, but it is moving faster, becoming harder to see, and shifting… Read more »

DirectDefense at RSAC 2026: Showcasing OT Defense in Action

Operational technology security is no longer a side conversation at RSA. It is central to the broader cybersecurity dialogue. As industrial environments become more connected, threat activity continues to evolve, and regulatory expectations increase, organizations are being pushed to strengthen how they detect and respond to incidents in OT environments. At RSA Conference 2026, DirectDefense… Read more »

Hacking the Human Voice: Our 1st Place Win at DEF CON’s Battle of the Bots

How do you build a bot that can out-talk human judgement in real time? At DEF CON’s first Battle of the Bots, we put ours to the test, and won. Team DirectDefense, consisting of Matt Bangert and Michael Tomlinson, were selected to compete in DEF CON’s first ever Battle of the Bots: Vishing Edition; a… Read more »

Cyber Due Diligence in the M&A Process

Why Cybersecurity in Mergers and Acquisitions Can be a Dealmaker – or a Deal Breaker It’s not uncommon for companies that are approaching a merger or acquisition process to focus on financials, company culture, and operational structure, casting cyber due diligence to the wayside. If cybersecurity isn’t a key component in a company’s M&A process,… Read more »

Critical Alert: Microsoft SharePoint Zero-Day Exploited in Active Attacks (CVE-2025-53770)

Unpatched SharePoint? This Zero-Day Could Let Attackers In Microsoft has issued an urgent warning regarding a newly weaponized zero-day vulnerability, CVE-2025-53770, affecting on-premise SharePoint Server deployments. With a CVSS score of 9.8, this remote code execution (RCE) flaw is being actively exploited and poses a severe risk to unpatched environments. What’s the Threat? This unauthenticated… Read more »

Water Treatment infrastructure

Tales From the Road: Establishing a Common Language Using NIST

Getting a wastewater utility’s OT and IT departments on the same page to address vulnerabilities they didn’t know they had. Wastewater utilities are among some of the most targeted industries for cyber attacks, and the implications can be devastating as operational interruptions or shut-downs could directly affect public health.  The Environmental Protection Agency (EPA) does… Read more »

Generative AI in Cybersecurity

Opportunities and Challenges in AI-Driven Threat Detection. Authenticity matters in business and relationships, and the noticeable lack of authenticity in AI-generated communications can limit its practical application. Generative AI in cybersecurity is a perfect example of the dichotomy between automation and human intelligence – AI can provide all the best data, but you have to… Read more »