Jim Donahue's Avatar

Jim Donahue

@jimdonahue-cyber.bsky.social

My work account, focused on cybersecurity. I'm the managing editor, content operations, at Dark Reading, part of Informa TechTarget.

295 Followers  |  26 Following  |  90 Posts  |  Joined: 26.11.2024  |  1.6602

Latest posts by jimdonahue-cyber.bsky.social on Bluesky

Preview
Building the Perfect Post-Security Incident Review Playbook By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators...

New on @darkreading.bsky.social, commentary by Pritesh Parekh, CISO, PagerDuty: "In an era where cyber threats are increasingly sophisticated and pervasive, the importance of post-incident security reviews cannot be overstated." Get tips on organizing your own reviews.

05.08.2025 15:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Why the Old Ways Are Still the Best for Most Cybercriminals While the cybercrime underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the same attack methods today as they were in 2020.

New on @darkreading.bsky.social, commentary by Trend Micro's Jon Clay: "While the cybercriminal underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the same attack methods today as they were in 2020."

05.08.2025 15:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Black Hat News Black Hat News

Get the latest news from Black Hat this week. www.darkreading.com/keyword/blac...

05.08.2025 15:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Scoop: CISA's contract with ICF has expired, reducing the JCDC's contractor workforce from 100+ to just 10. CISA can use emergency money & 2-week extensions to keep those 10 around, but only through Sept. Other contracts also caught up in huge backlog. www.cybersecuritydive.com/news/cisa-jo...

30.07.2025 14:53 β€” πŸ‘ 19    πŸ” 15    πŸ’¬ 2    πŸ“Œ 1
Preview
How to Spot Malicious AI Agents Before They Strike The rise of agentic AI means the battle of the machines is just beginning. To win, we'll need our own agents β€” human and machine β€” working together.

New on @darkreading.bsky.social, commentary by Alisdair Faulkner, Darwinium: "We must accept that malicious agents will often appear legitimate β€” and gain access. Defending against them requires speed, but not at the expense of paralyzing online commerce."

30.07.2025 19:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The CrowdStrike Outage Was Bad but Could Have Been Worse A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward...

New on @darkreading.bsky.social, commentary by Roger Cressey, Mountain Wave Ventures: "As we reflect on the anniversary of the largest outage in IT history, organizations everywhere need to make an active effort to ... create a more robust and resilient cyber ecosystem moving forward."

30.07.2025 19:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Securing the Budget: Demonstrating Cybersecurity's Return By tying security investments to measurable outcomes β€” like reduced breach likelihood and financial impact β€” CISOs can align internal stakeholders and justify spending based on real-world risk.

New on @darkreading.bsky.social : "By tying security investments to measurable outcomes β€” like reduced breach likelihood and financial impact β€” CISOs can align internal stakeholders and justify spending based on real-world risk." Commentary by Kara Sprague, CEO, HackerOne

24.07.2025 20:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Translating Cyber-Risk for the Boardroom When security leaders embrace this truth and learn to speak in the language of leadership, they don't just protect the enterprise, they help lead it forward.

New on @darkreading.bsky.social: "Many CISOs still find themselves speaking a technical language that fails to resonate with other leaders. Technical terms often fall flat in boardrooms more concerned with revenue growth and brand reputation." Commentary by Ashley Rose, Living Security

24.07.2025 20:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Criminal Networks Exploit Insider Vulnerabilities Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.

New on @darkreading.bsky.social: "Today's insider threats aren't lone wolves acting out of spite β€” they're pawns in the hands of sophisticated, organized criminal networks." Commentary by Rob Juncker, Mimecast

24.07.2025 20:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
3 Ways Security Teams Can Minimize Agentic AI Chaos Security often lags behind innovation. The path forward requires striking a balance.

New on @darkreading.bsky.social: "Agentic AI could be a disaster for authorization systems in software-as-a-service (SaaS) platforms as we know them today. But it doesn't have to be, if security and IT teams address the challenges proactively." Commentary by Josh Lemos, GitLab. chaos

24.07.2025 20:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

My new story about the U.S. government’s fraying partnerships with critical infrastructure operators is packed with new reporting, but there’s a lot more that I couldn’t fit into the story.

Here are some more details from my interviews over the past few weeks about where things stand…

27.06.2025 16:03 β€” πŸ‘ 47    πŸ” 21    πŸ’¬ 3    πŸ“Œ 5
Preview
Generative AI Exacerbates Software Supply Chain Risks Malicious actors are exploiting AI-fabricated software components β€” presenting a major challenge for securing software supply chains.

New on @darkreading.bsky.social: "The software development ecosystem needs clear requirements for AI transparency and a dedicated risk-disclosure framework. This framework should document key attributes such as training data sources, model versions, known limitations, and security features."

25.06.2025 16:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

New: Trump's federal workforce chaos is upending govt partnerships with U.S. critical infrastructure operators, jeopardizing work to protect vital services like healthcare and water from hackers & natural disasters.

My @cybersecuritydive.bsky.social‬ story: www.cybersecuritydive.com/news/critica...

25.06.2025 15:56 β€” πŸ‘ 171    πŸ” 96    πŸ’¬ 6    πŸ“Œ 16
Preview
A CISO's AI Playbook In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.

New on @darkreading.bsky.social: "Taking senior analysts out of repetitive triage loops gives them space to apply judgment, creativity, and curiosity to the harder problems." Erick Wille, CISO, Cabinetworks www.darkreading.com/vulnerabilit...

23.06.2025 14:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How CISOs Can Govern AI & Meet Evolving Regulations Security teams are no longer just the last line of defense β€” they are the foundation for responsible AI adoption.

New on @darkreading.bsky.social: "As AI transforms how enterprises operate, a new mandate [for CISOs] has emerged: Govern its use responsibly, end to end." Commentary by Ben de Bont, CISO, ServiceNow www.darkreading.com/vulnerabilit...

18.06.2025 14:23 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Foundations of Cybersecurity: Reassessing What Matters To truly future-proof your cybersecurity approach, it's vital to ensure that your security program is flexible and adaptable to both current and future business demands.

New on @darkreading.bsky.social: "To truly future-proof your cybersecurity approach, it's vital to ensure that your security program is flexible and adaptable to both current and future business demands." Brent Stackhouse, Vice President of Security & GRC, WP Engine

17.06.2025 16:31 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Operation Endgame: Do Takedowns & Arrests Matter? Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals.

New on @darkreading.bsky.social: "Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals. What, then, should we pursue? Everything. Everywhere. All at once. And always." James Shank, Director, Threat Operations, Expel

17.06.2025 16:28 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Generative AI is helping hackers write better malware, phish more convincingly,Β and seed open-source repositories with backdoors, a Gartner expert said at the company's security conference on Monday. www.cybersecuritydive.com/news/ai-cybe...

10.06.2025 15:00 β€” πŸ‘ 9    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
SSH Keys: The Powerful Credential You Probably Ignore SSH keys enable critical system access but often lack proper management. This security blind spot creates significant risk through untracked, unrotated credentials that persist across your infrastruct...

New commentary on @darkreading.bsky.social: "SSH keys aren't going anywhere. But unmanaged keys are a risk your organization doesn't need to take. Start by treating them like what they are: powerful credentials that deserve serious oversight."

10.06.2025 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Neuroscience Can Help Us Battle 'Alert Fatigue' By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only their digital assets but also the well-being of those...

New @darkreading.bsky.social: "Alert fatigue isn't merely an operational challenge; it's an existential threat to security effectiveness." Boaz Barzel, Field CTO, OX Security

09.06.2025 17:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Next-Gen Developers Are a Cybersecurity Powder Keg AI coding tools promise productivity but deliver security problems, too. As developers embrace "vibe coding," enterprises face mounting risks from insecure code generation that security team...

New on @darkreading.bsky.social: "Next-gen developers are crucial, and now is the time to ready the development cohort to leverage AI effectively and safely." Pieter Danhieux, CEO, Chairman & Co-Founder, Secure Code Warrior

09.06.2025 16:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

New: CISA has already lost ~1,000 employees to Trump's workforce purge, with the marquee Cybersecurity Division hit hard and many departures from the agency's field force of local cyber advisers. www.cybersecuritydive.com/news/cisa-de...

Confirming @samsabin.bsky.social‬'s scoop.

04.06.2025 15:36 β€” πŸ‘ 20    πŸ” 16    πŸ’¬ 1    πŸ“Œ 1
Post image

New: Broad coalitions of cyber firms, think tanks, former govt officials, and experts are backing Trump's nominees for CISA director and national cyber director, a sign of the perceived urgency of filling a leadership void. Confirmation hearing is Thursday. www.cybersecuritydive.com/news/trump-c...

03.06.2025 16:15 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 1    πŸ“Œ 1
Preview
In the AI Race With China, Don't Forget About Security The US needs to establish a clear framework to provide reasonable guardrails to protect its interests β€” the quicker, the better.

New on @darkreading.bsky.social: "If speed and security aren't reconciled, 'fastest first mover' is likely to dictate that speed wins and the epidemic of vulnerabilities that characterizes much of popular software today carries over into the AI age." Andrew Grotto, Stanford University

03.06.2025 19:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Is Your CISO Navigating Your Flight Path? If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.

New on @darkreading.bsky.social: "CISOs are the most qualified among leadership to understand and translate complex threats into business language and chart courses for the company that ensure survival and bring a competitive advantage." Richard Marcus, AuditBoard

03.06.2025 19:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Vibe Coding Changed the Development Process AI tools shook up development. Now, product security must change too.

New on @darkreading.bsky.social: "This isn't about waving red flags after the build pipeline is already green. This is about being in the room when the feature is defined, before a single prompt is typed into the AI tool." Commentary by Michael Nov, Prime Security #vibecoding

30.05.2025 15:33 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Rethinking Data Privacy in the Age of Generative AI The key to navigating this new GenAI landscape is a balanced approach β€” one that fosters transparency, strengthens regulatory frameworks, and embraces privacy-enhancing technologies.

New on @darkreading.bsky.social: "A robust framework for AI ethics and compliance should prioritize transparency, regulatory adaptability, and the adoption of privacy-enhancing technologies." Jimmy Astle, Senior Director of AI Platform and Data Science, Red Canary

23.05.2025 14:50 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place Dark Reading Confidential Episode 6: Cyber researchers Ismael Valenzuela and Vitor Ventura share riveting stories about the creative tricks they used to track down advanced persistent threat groups, a...

New on @darkreading.bsky.social: Dark Reading Confidential Podcast Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way. (You'll also hear my dulcet tones.)

21.05.2025 22:04 β€” πŸ‘ 0    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Security Threats of Open Source AI Exposed by DeepSeek DeepSeek's risks must be carefully considered, and ultimately mitigated, in order to enjoy the many benefits of generative AI in a manner that is safe and secure for all organizations and users.

New on @darkreading.bsky.social: "There are certain categories of risks that security and compliance professionals must consider when evaluating the use of any open source AI platform within their organizations." Maurice Uenuma, Vice President & General Manager, Americas, Blancco

22.05.2025 14:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place Dark Reading Confidential Episode 6: Cyber researchers Ismael Valenzuela and Vitor Ventura share riveting stories about the creative tricks they used to track down advanced persistent threat groups, a...

New on @darkreading.bsky.social: Dark Reading Confidential Podcast Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way. (You'll also hear my dulcet tones.)

21.05.2025 22:04 β€” πŸ‘ 0    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

@jimdonahue-cyber is following 19 prominent accounts