Jim Donahue's Avatar

Jim Donahue

@jimdonahue-cyber.bsky.social

My work account, focused on cybersecurity. I'm the managing editor, content operations, at Dark Reading, part of Informa TechTarget.

294 Followers  |  26 Following  |  97 Posts  |  Joined: 26.11.2024  |  1.9687

Latest posts by jimdonahue-cyber.bsky.social on Bluesky

I'm retiring as of tomorrow, so this work account will be going dark. (It seems likely I'll do some freelance work in 2026, so I'm not shutting down the acct. But I'm taking it easy a few months.)

I do have a personal account here, but it seems weird to post the link. Feel free to DM me, though.

27.08.2025 14:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
10 Major GitHub Risk Vectors Hidden in Plain Sight By addressing these overlooked risk vectors, organizations can continue leveraging GitHub's innovation while protecting against sophisticated supply chain attacks targeting interconnected software.

New on @darkreading.bsky.social, commentary by Liad Cohen and Eyal Paz, OX Security: "By addressing these risk vectors, organizations can continue leveraging GitHub's innovation while protecting against the sophisticated supply chain attacks targeting our interconnected software ecosystem."

19.08.2025 14:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Evolving RATs Are Redefining Enterprise Security Threats A more unified and behavior-aware approach to detection can significantly improve security outcomes.

New on @darkreading.bsky.social, commentary by Aditya K. Sood, VP of Security Engineering & AI Strategy, Aryaka: "Today's RATs don't just exploit technical vulnerabilities. They also take advantage of the blind spots created by how enterprise architects establish their security environments."

18.08.2025 14:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Using Security Expertise to Bridge the Communication Gap Cybersecurity-focused leadership delivers better products and business outcomes.

New on @darkreading.bsky.social, commentary by Ivanti's Field CISO Mike Riemer: "When security becomes part of the development culture rather than an external constraint, teams start thinking about security implications naturally as they build features."

15.08.2025 14:47 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Critical Flaw in CVE Scoring With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.

New on @darkreading.bsky.social, commentary by Ofri Ouzan, Security Researcher & Advocate, JFrog: CVE scoring systems "often fail to account for the unique context of each organization's environment. As a result, teams risk focusing on theoretical risks while genuine threats may be overlooked."

11.08.2025 15:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Redefining the Role: What Makes a CISO Great Security is everyone's responsibility, but as a CISO, it starts with you.

New on @darkreading.bsky.social, commentary by Lane Sullivan, Chief Information Security & Strategy Officer, Concentric AI: "Being a CISO today is a balancing act of strategic leadership, financial literacy, technical expertise, and human connection, regardless of [company size]."

11.08.2025 15:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Will Secure AI Be the Hottest Career Path in Cybersecurity? Securing AI systems represents cybersecurity's next frontier, creating specialized career paths as organizations grapple with novel vulnerabilities, regulatory requirements, and cross-functional deman...

New on @darkreading.bsky.social, commentary by Melina Scotto, Founder, Mastin & Associates: "Consider securing AI as your next career opportunity to transform challenges into a strategic advantage and build cyber resilience in a rapidly changing, AI-enabled, digital world."

11.08.2025 15:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Building the Perfect Post-Security Incident Review Playbook By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators...

New on @darkreading.bsky.social, commentary by Pritesh Parekh, CISO, PagerDuty: "In an era where cyber threats are increasingly sophisticated and pervasive, the importance of post-incident security reviews cannot be overstated." Get tips on organizing your own reviews.

05.08.2025 15:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Why the Old Ways Are Still the Best for Most Cybercriminals While the cybercrime underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the same attack methods today as they were in 2020.

New on @darkreading.bsky.social, commentary by Trend Micro's Jon Clay: "While the cybercriminal underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the same attack methods today as they were in 2020."

05.08.2025 15:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Black Hat News Black Hat News

Get the latest news from Black Hat this week. www.darkreading.com/keyword/blac...

05.08.2025 15:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Scoop: CISA's contract with ICF has expired, reducing the JCDC's contractor workforce from 100+ to just 10. CISA can use emergency money & 2-week extensions to keep those 10 around, but only through Sept. Other contracts also caught up in huge backlog. www.cybersecuritydive.com/news/cisa-jo...

30.07.2025 14:53 β€” πŸ‘ 19    πŸ” 13    πŸ’¬ 2    πŸ“Œ 1
Preview
How to Spot Malicious AI Agents Before They Strike The rise of agentic AI means the battle of the machines is just beginning. To win, we'll need our own agents β€” human and machine β€” working together.

New on @darkreading.bsky.social, commentary by Alisdair Faulkner, Darwinium: "We must accept that malicious agents will often appear legitimate β€” and gain access. Defending against them requires speed, but not at the expense of paralyzing online commerce."

30.07.2025 19:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The CrowdStrike Outage Was Bad but Could Have Been Worse A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward...

New on @darkreading.bsky.social, commentary by Roger Cressey, Mountain Wave Ventures: "As we reflect on the anniversary of the largest outage in IT history, organizations everywhere need to make an active effort to ... create a more robust and resilient cyber ecosystem moving forward."

30.07.2025 19:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Securing the Budget: Demonstrating Cybersecurity's Return By tying security investments to measurable outcomes β€” like reduced breach likelihood and financial impact β€” CISOs can align internal stakeholders and justify spending based on real-world risk.

New on @darkreading.bsky.social : "By tying security investments to measurable outcomes β€” like reduced breach likelihood and financial impact β€” CISOs can align internal stakeholders and justify spending based on real-world risk." Commentary by Kara Sprague, CEO, HackerOne

24.07.2025 20:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Translating Cyber-Risk for the Boardroom When security leaders embrace this truth and learn to speak in the language of leadership, they don't just protect the enterprise, they help lead it forward.

New on @darkreading.bsky.social: "Many CISOs still find themselves speaking a technical language that fails to resonate with other leaders. Technical terms often fall flat in boardrooms more concerned with revenue growth and brand reputation." Commentary by Ashley Rose, Living Security

24.07.2025 20:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Criminal Networks Exploit Insider Vulnerabilities Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.

New on @darkreading.bsky.social: "Today's insider threats aren't lone wolves acting out of spite β€” they're pawns in the hands of sophisticated, organized criminal networks." Commentary by Rob Juncker, Mimecast

24.07.2025 20:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
3 Ways Security Teams Can Minimize Agentic AI Chaos Security often lags behind innovation. The path forward requires striking a balance.

New on @darkreading.bsky.social: "Agentic AI could be a disaster for authorization systems in software-as-a-service (SaaS) platforms as we know them today. But it doesn't have to be, if security and IT teams address the challenges proactively." Commentary by Josh Lemos, GitLab. chaos

24.07.2025 20:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

My new story about the U.S. government’s fraying partnerships with critical infrastructure operators is packed with new reporting, but there’s a lot more that I couldn’t fit into the story.

Here are some more details from my interviews over the past few weeks about where things stand…

27.06.2025 16:03 β€” πŸ‘ 47    πŸ” 21    πŸ’¬ 3    πŸ“Œ 5
Preview
Generative AI Exacerbates Software Supply Chain Risks Malicious actors are exploiting AI-fabricated software components β€” presenting a major challenge for securing software supply chains.

New on @darkreading.bsky.social: "The software development ecosystem needs clear requirements for AI transparency and a dedicated risk-disclosure framework. This framework should document key attributes such as training data sources, model versions, known limitations, and security features."

25.06.2025 16:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

New: Trump's federal workforce chaos is upending govt partnerships with U.S. critical infrastructure operators, jeopardizing work to protect vital services like healthcare and water from hackers & natural disasters.

My @cybersecuritydive.bsky.social‬ story: www.cybersecuritydive.com/news/critica...

25.06.2025 15:56 β€” πŸ‘ 171    πŸ” 96    πŸ’¬ 6    πŸ“Œ 16
Preview
A CISO's AI Playbook In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.

New on @darkreading.bsky.social: "Taking senior analysts out of repetitive triage loops gives them space to apply judgment, creativity, and curiosity to the harder problems." Erick Wille, CISO, Cabinetworks www.darkreading.com/vulnerabilit...

23.06.2025 14:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How CISOs Can Govern AI & Meet Evolving Regulations Security teams are no longer just the last line of defense β€” they are the foundation for responsible AI adoption.

New on @darkreading.bsky.social: "As AI transforms how enterprises operate, a new mandate [for CISOs] has emerged: Govern its use responsibly, end to end." Commentary by Ben de Bont, CISO, ServiceNow www.darkreading.com/vulnerabilit...

18.06.2025 14:23 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Foundations of Cybersecurity: Reassessing What Matters To truly future-proof your cybersecurity approach, it's vital to ensure that your security program is flexible and adaptable to both current and future business demands.

New on @darkreading.bsky.social: "To truly future-proof your cybersecurity approach, it's vital to ensure that your security program is flexible and adaptable to both current and future business demands." Brent Stackhouse, Vice President of Security & GRC, WP Engine

17.06.2025 16:31 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Operation Endgame: Do Takedowns & Arrests Matter? Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals.

New on @darkreading.bsky.social: "Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals. What, then, should we pursue? Everything. Everywhere. All at once. And always." James Shank, Director, Threat Operations, Expel

17.06.2025 16:28 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Generative AI is helping hackers write better malware, phish more convincingly,Β and seed open-source repositories with backdoors, a Gartner expert said at the company's security conference on Monday. www.cybersecuritydive.com/news/ai-cybe...

10.06.2025 15:00 β€” πŸ‘ 9    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
SSH Keys: The Powerful Credential You Probably Ignore SSH keys enable critical system access but often lack proper management. This security blind spot creates significant risk through untracked, unrotated credentials that persist across your infrastruct...

New commentary on @darkreading.bsky.social: "SSH keys aren't going anywhere. But unmanaged keys are a risk your organization doesn't need to take. Start by treating them like what they are: powerful credentials that deserve serious oversight."

10.06.2025 15:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How Neuroscience Can Help Us Battle 'Alert Fatigue' By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only their digital assets but also the well-being of those...

New @darkreading.bsky.social: "Alert fatigue isn't merely an operational challenge; it's an existential threat to security effectiveness." Boaz Barzel, Field CTO, OX Security

09.06.2025 17:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Next-Gen Developers Are a Cybersecurity Powder Keg AI coding tools promise productivity but deliver security problems, too. As developers embrace "vibe coding," enterprises face mounting risks from insecure code generation that security team...

New on @darkreading.bsky.social: "Next-gen developers are crucial, and now is the time to ready the development cohort to leverage AI effectively and safely." Pieter Danhieux, CEO, Chairman & Co-Founder, Secure Code Warrior

09.06.2025 16:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

New: CISA has already lost ~1,000 employees to Trump's workforce purge, with the marquee Cybersecurity Division hit hard and many departures from the agency's field force of local cyber advisers. www.cybersecuritydive.com/news/cisa-de...

Confirming @samsabin.bsky.social‬'s scoop.

04.06.2025 15:36 β€” πŸ‘ 20    πŸ” 16    πŸ’¬ 1    πŸ“Œ 1
Post image

New: Broad coalitions of cyber firms, think tanks, former govt officials, and experts are backing Trump's nominees for CISA director and national cyber director, a sign of the perceived urgency of filling a leadership void. Confirmation hearing is Thursday. www.cybersecuritydive.com/news/trump-c...

03.06.2025 16:15 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 1    πŸ“Œ 1

@jimdonahue-cyber is following 20 prominent accounts