
Securing the AI Economy: From the 2025 Holiday Breach Window to 2026’s Autonomous Threats
07-1-2026 | 15 Min.
This episode analyzes the 2025 threat landscape, where U.S. data breach costs reached record highs of $10.22 million and cybercriminals utilized the "holiday breach window" to stage sophisticated attacks for the new year. We explore the transition into 2026—projected by experts to be the "Year of the Defender"—where organizations must combat "Agentic AI" threats and manage a staggering 82:1 machine-to-human identity ratio. Listeners will also gain actionable strategies for closing year-end security gaps, such as implementing rigorous patch management and testing incident response plans before the workforce disperses for the season. www.breached.company/cybersecurity-threat-landscape-and-2026-outlook Sponsor: www.breached.company

The AI Rubicon: Navigating the Intelligence Supercycle and the 2026 Threat Landscape
06-1-2026 | 14 Min.
The year 2026 marks the entry into the "Intelligence Supercycle," a pivotal era where autonomous AI agents transition from mere tools to independent actors capable of executing complex attacks and defensive workflows at machine speed. Security leaders face a dual pressure: responding to the immediate rise of "portfolio extortion" ransomware and "Shadow Agent" risks, while simultaneously addressing the "harvest now, decrypt later" threat that is accelerating the timeline for post-quantum cryptography adoption. To survive this volatility, organizations are moving beyond reactive measures toward "geopatriation" of data and mature Zero Trust programs, as governments nationalize critical infrastructure to defend against pre-positioned nation-state threats. www.securitycareers.help/cybersecurity-outlook-for-2026-an-integrated-threat-and-strategy-briefing Sponsors: www.cisomarketplace.com

Europe’s Cyber Front: From Silent Breaches to Sustained Disruption
06-1-2026 | 14 Min.
This episode examines the 926 cyber incidents recorded across Europe in November 2025, revealing a strategic shift where Distributed Denial of Service (DDoS) campaigns accounted for over 51% of all activity. We unpack how Telegram has become the "central nervous system" for coordinating these disruptions against government and transport infrastructure, operating alongside a fragmented but active ransomware economy led by groups like Qilin. Drawing on FalconFeeds.io’s intelligence, we discuss why this new era of sustained pressure demands a move from reactive defenses to proactive, intelligence-driven readiness. www.breached.company/europe-cyber-threat-briefing-november-2025-analysis Sponsor: www.breached.company

The Great De-Anonymization: How Mandatory ID Laws Are Closing the Open Internet
04-1-2026 | 40 Min.
From Australia’s implementation of search engine ID checks to Virginia’s biometric age gates, a synchronized global legislative wave is transforming the web into a permission-based surveillance system. We investigate how these "child safety" mandates are necessitating permanent identity databases that effectively eliminate anonymous speech, as seen in Victoria's crackdown on "hate speech" and the EU's "trusted flagger" hierarchy. Finally, we explore the escalating diplomatic crisis as U.S. lawmakers threaten to compel testimony from foreign regulators accused of enforcing a "global censorship regime" on American platforms. www.compliancehub.wiki/briefing-on-global-digital-regulation-and-surveillance-trends Sponsor: www.compliancehub.wiki

Breached 2025: AI, Insiders, and the Supply Chain Crisis
03-1-2026 | 42 Min.
With global cybercrime costs projected to reach $10.5 trillion annually by 2025, this episode unpacks the surge in ransomware and data breaches targeting critical sectors like healthcare, manufacturing, and water systems. We explore how "enterprising adversaries" are weaponizing generative AI for deepfakes and vishing while exploiting third-party supply chains to compromise major entities like 700Credit and Snowflake. Finally, we analyze the critical "human element" of cybersecurity, from the infiltration of North Korean IT workers to the bribing of insiders, revealing why identity protection has become the new perimeter. www.breached.company/briefing-2025-cybersecurity-threat-landscape-and-incident-analysis Micro Tools: https://finemydata.com https://databreachcostcalculator.com Sponsors: www.breached.company www.cisomarketplace.com



CISO Insights: Voices in Cybersecurity