Sitemap - 2025 - SMB Tech & Cybersecurity Leadership Newsletter

Security Copilot in Microsoft 365 E5: Maximizing AI-Powered Security Capabilities

3 Urgent Cyber Threats Costing SMBs Millions (2025 Update)

The Fired Developer’s "Kill Switch": Why Offboarding is Your Strongest Defense

Breaking into Cybersecurity: Brian Carbaugh's Journey from CIA to Cyber Startup

Leadership Lessons from the CIA: Building a Resilient Cyber Defense

Don't Boil the Ocean: A Cost-Effective Architecture for CMMC Level 2

How to Stop React2Shell: An SMB Remediation Guide

Let’s Build Your 2026 Leadership Playbook

The 2025 Reality Check: Why State Hackers Want Your Small Business Network (And How to Stop Them for Free)

The Silent Kill Switch: Why Your Business Needs a "Human" Disaster Recovery Plan

From FBI to Cybersecurity Leader: M.K. Palmore's Career Journey | Breaking Into Cybersecurity

Charting the Course: Insights from M.K. Palmore's Journey into Cybersecurity.

The CISO’s Dual-Focus: A Framework for Advancing Your Security Program and Your Career

Erica Shoemate: From Breaking In to Breaking Barriers – A Memphis Trailblazer Reshaping AI & Cybersecurity on Her Own Terms

Erica Shoemate: From Breaking In to Breaking Barriers – A Memphis Trailblazer Reshaping AI & Cybersecurity on Her Own Terms

SesameOp: The New Backdoor Abusing OpenAI API for C2

The SMB Leader's Playbook for AI Governance: From Strategy to Secure Deployment

Identity Threat Detection & Response for NHI's - What Does Right Look Like?

Your CEO and Your Sales Team Don't Face the Same Threats.

Beyond the Bad Link: 5 Advanced Phishing Techniques

Breaking into Cybersecurity: An In-Depth Conversation with Eric Stride

Building the Cybersecurity Workforce: Eric Stride's Perspective

Reach out if you need support

What is Microsoft Security Copilot? An In-Depth Look at AI in Cybersecurity

Quantum Computing: Your Next Great Opportunity

Streamline Your Cloud Security: The Efficiency of SRMs and Validated Partners

Can I get your advice?

Beyond the Cloud: Mastering the Shared Responsibility Model for Comprehensive Risk Management

Breaking into Cybersecurity: Insights from Sandeep Pauddar, Global Program Director at DQS

Breaking into Cybersecurity with Motti Tal, Chief Strategy Officer at Memcyco

Breaking Into Cybersecurity: Insights from Bill Welser of Lotic.ai

Sinan Eren: From Red Teaming to Launching Startups

Demystifying Digital Risk: A Holistic Guide to Enterprise Cybersecurity Assessment

The Scalable Security Playbook: A CISO & CIO Partnership Guide

Your Cybersecurity Career Blueprint: Expert Advice from Motti Tal

Beyond the Bank Account: Phishing as a Tool for Espionage

Navigating the Future of Cybersecurity: Insights from William (Bill) Welser IV

Cybersecurity Entrepreneurship: Real-World Advice from Serial Founder Sinan Eren

How to Build a Security Culture with Data-Driven Reporting

Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program

Perk of being a paid subscriber, a chat discuss challenges and opportunities!

The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack

Data-Centric Security: Protect Your Cloud Data with Microsoft Defender

The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration

Develop and Enforce Robust Remediation Policies and SLAs

From Psychology to Cybersecurity: Craig Taylor's Impact

Breaking Into Cybersecurity: Craig Taylor's Journey and Insights on AI and Cyber Awareness

Navigating the Cybersecurity Career Path: Insights from CISO Tradecraft with Guest Christophe Foulon

Embed Security into the DevOps Lifecycle (DevSecOps)

CISO Trade Craft Podcast with Guest Christophe Foulon

CISO Trade Craft Podcast: Navigating the Path to Cybersecurity Leadership: Insights from CISO Tradecraft with Christophe Foulon

AI and Cybersecurity: Jon Salisbury on Driving Change

TRaViS: See Your Company Through an Attacker’s Eyes—Before They Do

Automate Remediation and Response with Security Orchestration

Breaking Into Cybersecurity with Nati Tal: From Homeland Security to B2C

Cloud Security: Identity as the New Perimeter | JIT & Adaptive Access

Adin Stein's Journey: From Smart Grids to Cybersecurity Leadership

Overwhelmed by Alerts? A Guide to Risk-Based Prioritization Over CVS

Breaking into Cybersecurity: Developing the Next Generation of Cyber Talent

10 Best Practices for the Modern Enterprise: Achieve Complete Attack Surface Visibility

Personality of AI Security Agents

Breaking into Cybersecurity: Career Journey and Insights with Gavin Reid

Improving Your Cloud Security Posture with Vulnerability Remediation

AI-Powered Phishing: The Top Threat for SMBs in 2025 – and How to Fight Back

Your 'Secure' Data Isn't Safe. Here's Why.

Strengthening Your Digital Defense: Practical Cybersecurity Approaches for SMB Tech Executives in 2025

Implementing Zero Trust Security for Small and Medium Businesses with Microsoft Solutions

Review of the 2025 Verizon DBIR

Navigating CMMC 2.0: A Strategic Imperative for Tech Leaders Protecting CUI

Crafting an Effective Overall Risk Management Plan for SMBs from Scratch

Navigating NIST 800-171 Compliance: A Strategic Guide for SMBs

Combating Security Platform Fatigue: A Strategic Approach to Tool Consolidation

Building a Robust Data Governance Strategy for SMBs

Safely Implementing AI for SMBs

Implementing Zero Trust Security for Small and Medium Businesses with Microsoft Solutions

Poll

Getting your SMB ready for AI use safely

AI-Powered Gamification: Revolutionizing Cybersecurity Training for SMBs

Proposed 2025 HIPAA Security Rule Changes & SMB Implications

Connecting DHCP Data Sources to Microsoft Sentinel, Querying with KQL, and Creating Custom Dashboards

Getting Started with Microsoft Compliance Manager

Breaking into Cybersecurity - Transitioning from Sales to Cyber Threat Intelligence with Mary D'Angelo

The Importance of Data Security Posture Management for SMB Leaders

A Deep Dive into Modernizing SMB Security

Stepping into Zero Trust with a Solid Strategy

Azure Security Best Practices for Small to Medium-Sized Businesses

Breaking into Cybersecurity with Philip Wiley: From Sysadmin to Ethical Hacking Expert

The Identity and Data Management Challenge for SMBs: Navigating the Digital Landscape

Preparing Your Data Governance Journey for AI

Building Cybersecurity Culture: Engage Employees & Mitigate Risk

Essential Cybersecurity Policies for SMBs: A Blueprint for Protection and Growth

Top 5 Cybersecurity Challenges for Small Businesses