Subscribe
Sign in
Home
Podcast
Notes
Chat
Archive
Leaderboard
About
Latest
Top
Discussions
How to Stop React2Shell: An SMB Remediation Guide
React2Shell is targeting your frontend. See how it compares to Log4j and why SMBs face higher reputation risks. Get the threat analysis here.
Dec 11
Â
•
Â
Christophe Foulon 📓
Let’s Build Your 2026 Leadership Playbook
Help me design the roadmap that solves your biggest headaches next year.
Dec 8
Â
•
Â
Christophe Foulon 📓
1
1
The 2025 Reality Check: Why State Hackers Want Your Small Business Network (And How to Stop Them for Free)
State hackers view your SMB as a strategic 'relay box.' Learn how to lock down your edge, enforce application control, and stop credential theft without…
Dec 2
Â
•
Â
Christophe Foulon 📓
1
1
November 2025
The Silent Kill Switch: Why Your Business Needs a "Human" Disaster Recovery Plan
It started with a quiet Tuesday morning and the sudden, jarring arrival of an ambulance across the street.
Nov 30
Â
•
Â
Christophe Foulon 📓
4
4
1
Charting the Course: Insights from M.K. Palmore's Journey into Cybersecurity.
Want to break into cyber? M.K. Palmore shares his roadmap: from the Naval Academy & FBI to the C-Suite. Learn why "intentionality" and communication are…
Nov 21
Â
•
Â
Christophe Foulon 📓
27:18
The CISO’s Dual-Focus: A Framework for Advancing Your Security Program and Your Career
Are you advancing your security program, or your career? The best CISOs do both. This article offers a clear, dual-focus framework for growing your…
Nov 17
Â
•
Â
Christophe Foulon 📓
3
Erica Shoemate: From Breaking In to Breaking Barriers – A Memphis Trailblazer Reshaping AI & Cybersecurity on Her Own Terms
Explore Erica Shoemate's inspiring journey from inner-city Memphis to leadership in cybersecurity and AI policy. Learn how she pivoted from the FBI to…
Nov 15
Â
•
Â
Christophe Foulon 📓
1
SesameOp: The New Backdoor Abusing OpenAI API for C2
The SesameOp backdoor abuses the OpenAI API for stealthy C2, hiding in trusted traffic. Learn how it works and discover key EDR and network controls to…
Nov 4
Â
•
Â
Christophe Foulon 📓
October 2025
The SMB Leader's Playbook for AI Governance: From Strategy to Secure Deployment
For tech and cyber leaders at small and medium-sized businesses, the AI revolution is no longer a distant headline—it's a present-day reality.
Oct 25
Â
•
Â
Christophe Foulon 📓
1
Identity Threat Detection & Response for NHI's - What Does Right Look Like?
Approaching NHI ITDR using Permiso's ITDR Playbook for NHI Compromise
Published on Resilient Cyber
Â
•
Â
Oct 24
Your CEO and Your Sales Team Don't Face the Same Threats.
Why your cybersecurity training shouldn't be the same, and how to create a targeted program that works.
Oct 22
Â
•
Â
Christophe Foulon 📓
3
Beyond the Bad Link: 5 Advanced Phishing Techniques
Beyond the "Bad Link": 5 Phishing Tactics You Need to Know in 2025. Phishing is more than bad links. Learn to spot advanced tactics like QR code…
Oct 21
Â
•
Â
Christophe Foulon 📓
1
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts