{"id":15053,"date":"2025-10-30T16:41:54","date_gmt":"2025-10-30T16:41:54","guid":{"rendered":"https:\/\/newestek.com\/?p=15053"},"modified":"2025-10-30T16:41:54","modified_gmt":"2025-10-30T16:41:54","slug":"cybersecurity-awareness-month-quotes-and-commentary-from-industry-experts-in-2025","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15053","title":{"rendered":"Cybersecurity Awareness Month Quotes and Commentary from Industry Experts in 2025"},"content":{"rendered":"<div>\n<p><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium_large wp-image-7513\"src=\"https:\/\/newestek.com\/wp-content\/uploads\/2025\/10\/Cybersecurity-Awareness-Month-2025.jpg\" alt=\"Cybersecurity Awareness Month Quotes and Commentary\" width=\"768\" height=\"384\" srcset=\"https:\/\/solutionsreview.com\/identity-management\/files\/2025\/10\/Cybersecurity-Awareness-Month-2025-768x384.jpg 768w, https:\/\/solutionsreview.com\/identity-management\/files\/2025\/10\/Cybersecurity-Awareness-Month-2025-300x150.jpg 300w, https:\/\/newestek.com\/wp-content\/uploads\/2025\/10\/Cybersecurity-Awareness-Month-2025.jpg 800w\" sizes=\"(max-width: 768px) 100vw, 768px\"><\/p>\n<p><em><strong>For Cybersecurity Awareness Month 2025, the editors at Solutions Review have compiled a list of quotes, predictions, and commentary from leading experts across industries.<\/strong><\/em><\/p>\n<p>As part of this year\u2019s Cybersecurity Awareness Month, we\u00a0<span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">invited the best and brightest minds in the enterprise technology market to share their best practices, predictions, and personal anecdotes about <strong><a href=\"https:\/\/solutionsreview.com\/ai-wont-replace-you-but-lack-of-soft-skills-might\/\" target=\"_blank\" rel=\"noopener\">the impact of artificial intelligence on their careers<\/a><\/strong><\/span>, companies, and more. The experts featured represent some of the top influencers, consultants, and solution providers with experience across industries, and each projection has been vetted for relevance and ability to add business value.<\/p>\n<h2 style=\"text-align: center;\"><strong>Cybersecurity Awareness Month Quotes from Industry Experts in 2025<\/strong><\/h2>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/kevinbocek\/\" target=\"_blank\" rel=\"noopener\"><strong>Kevin Bocek, SVP of Innovation at CyberArk<\/strong><\/a><\/h4>\n<p>\u201cAs we enter Cybersecurity Awareness Month, organizations from retailers to airports to daycares are under attack. Unfortunately, the next big incident may be of our own making. Within months, every business and government agency will be required by Google, Microsoft, and Apple to replace their TLS certificates at an increasingly rapid pace. Beginning in March, certificates must be renewed more frequently, or websites will not load, mobile apps will not connect, and even baggage handling systems and ATMs could go offline. TLS certificates, also known as machine identities, are essential for authenticating sites to browsers and apps and for enabling encryption.<\/p>\n<p>\u201cWe all recognize the problem when visiting a site that shows \u2018can\u2019t be trusted\u2019 or \u2018expired certificate.\u2019 Now imagine the chaos if that happens eight to ten times more often within every organization as TLS certificate lifetimes shrink to just 47 days, leaving customers and citizens locked out. The good news is that automation is available through certificate management tools for every business. This is all part of sound machine identity security, which now requires the same level of priority and protection that we give to human identities.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/ellen-boehm-alkiewicz\/\" target=\"_blank\" rel=\"noopener\"><strong>Ellen Boehm, SVP of IoT and AI Identity Innovation at Keyfactor<\/strong><\/a><\/h4>\n<p>\u201cThis Cybersecurity Awareness Month, enterprises face a growing risk that wasn\u2019t on the radar just a year ago: rogue AI agents. With agentic AI now moving into production, autonomous systems are capable of making decisions, transacting, and executing tasks without human oversight. Without strong identity and trust controls, these agents can quickly become shadow AI, acting outside policy, spoofing identities, or initiating fraud at machine speed.<\/p>\n<p>\u201cThe challenge is clear. Most organizations can\u2019t yet answer the fundamental question: Is this AI agent authentic? Legacy authentication methods like API keys and static tokens are easily compromised and offer no cryptographic proof of identity. If not addressed, this gap opens the door to breaches, data loss, and trust breakdowns, far faster than human-led security teams can respond.<\/p>\n<p>\u201cTo counter this, digital trust must be embedded at the identity layer. Certificate-based machine identity management allows organizations to verify every agent, enforce policies, and revoke trust instantly if compromise occurs. This approach ensures visibility, accountability, and control over AI behavior in real-time. As agentic AI becomes part of the enterprise, securing it is no longer optional; it\u2019s foundational. This Cybersecurity Awareness Month is a reminder that new threats demand new trust models.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/mrbritton\/\" target=\"_blank\" rel=\"noopener\"><strong>Mike Britton, Chief Information Officer at Abnormal AI<\/strong><\/a><\/h4>\n<p>\u201cWhile security education and training should, of course, be an ongoing initiative, Cybersecurity Awareness Month presents a unique opportunity for security leaders to emphasize the behaviors, tools, and resources that can help employees support the organization\u2019s security year-round. To combat increasingly sophisticated threats\u2014like those powered by generative AI\u2014training must focus on the personal value of security for employees. Security leaders can also make education memorable and fun through gamification, contests, or inviting guest speakers. The goal is to maximize October\u2019s momentum to establish an ongoing culture of security awareness that keeps employees engaged and cyber-focused throughout the remainder of the year, thereby protecting the organization.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/philcalvin\/\" target=\"_blank\" rel=\"noopener\"><strong>Phil Calvin, Chief Product Officer at Delinea<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p id=\"isPasted\">\u201cThe attack surface is changing, and the rise of machine identities is at the core of it. From chatbots to APIs and autonomous agents, these identities already outnumber humans; yet, they\u2019re too often overlooked in cybersecurity strategies. <a href=\"https:\/\/delinea.com\/resources\/2025-ai-in-identity-security\" target=\"_blank\" rel=\"noopener\">94 percent of organizations plan to adopt AI in identity security, but only 28 percent prioritize securing machine identities today<\/a>, exposing a dangerous gap. Securing these identities is just as critical as protecting human ones if businesses want to stay secure.<\/p>\n<p>\u201cCybersecurity Awareness Month is a reminder that visibility, control, and collaboration are essential. As machine identities increasingly become entry points for attackers, organisations should start with visibility into where they are and what they can access. Then, it\u2019s about shortening credential lifespans\u2013that way, stolen details will quickly expire. Finally, it\u2019s important to restrict each identity\u2019s access to only what it truly needs, ensuring the principles of least privilege are applied consistently.<\/p>\n<p>\u201cIdentity security needs to evolve so that every identity, whether human or machine, can be trusted to work together. Businesses that get this right will position themselves as standard-setters, turning a vulnerability into an advantage and giving their industries the foundation to thrive.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/jackcherkas\/\" target=\"_blank\" rel=\"noopener\"><strong>Jack Cherkas, Global Chief Information Security Officer at Syntax<\/strong><\/a><\/h4>\n<p>\u201cIn an era of generative AI, automation, quantum computing, and advanced security platforms, it\u2019s tempting to believe that only the latest technology can keep you safe online. This year\u2019s Cybersecurity Awareness Month \u2018Core 4\u2019 actions prove this is a myth. The fundamentals\u2014strong passwords, multi\u2011factor authentication, timely software updates, and scam awareness\u2014remain the most consistently effective defenses for both organizations and individuals. For businesses, these basics safeguard operations and reputation; for individuals, they protect finances, privacy, and daily life. Getting them right is the cornerstone of cyber resilience and the foundation for safe innovation.\u201d<\/p>\n<hr>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/anthonycusimano89\/\" target=\"_blank\" rel=\"noopener\"><strong>Anthony Cusimano, Solutions Director at Object First<\/strong><\/a><\/h4>\n<p>\u201cRansomware attacks are no longer just about disrupting operations\u2014they\u2019re increasingly targeting backups. In fact, 96 percent of attacks hit backup data, yet securing backups is often overlooked in cybersecurity strategies. Simply having backups isn\u2019t enough anymore; organizations must adopt storage that ensures Absolute Immutability to prevent tampering, encryption, or deletion, ensuring recovery is always possible. The rise of AI-generated data makes immutability even more critical. AI produces massive volumes of essential data, yet 65 percent of organizations back up less than half of it, leaving it vulnerable to cyber-criminals.<\/p>\n<p>\u201cThis Cybersecurity Awareness Month, organizations must treat data protection as a core cybersecurity responsibility. Disaster recovery plans should minimize downtime, safeguard critical assets, and align backup strategies with Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). Regular testing, monitoring, and threat simulations ensure readiness for ransomware, insider threats, and emerging cyber-attacks. Investing in modern, immutable storage and comprehensive recovery plans strengthens organizational resilience, reduces cyber risk, and ensures critical data remains secure. Protecting data is no longer optional; it\u2019s a strategic cybersecurity imperative.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/jameswdoggettjr\/\" target=\"_blank\" rel=\"noopener\"><strong>Jim Doggett, CISO at Semperis<\/strong><\/a><\/h4>\n<p>\u201cFor too long, the industry has operated under a false sense of security, believing that if we just buy enough tools, we can prevent every attack. That mindset is fundamentally flawed and, frankly, dangerous. This is especially true when it comes to preventing and recovering from ransomware attacks. Within the past 12 months, nearly 80 percent of organizations have been targeted by ransomware, with 40 percent of attacks involving a physical threat of some kind. The stakes have never been higher.<\/p>\n<p>\u201cCybersecurity leaders, particularly CISOs, must operate under the assumption that ransomware attacks are not a matter of if but when. To prepare, they need a proactive disaster recovery plan centered on clear communication to keep the business running smoothly during an attack. Ransomware can shut down critical operations across the organization, everything from WiFi and phones to Active Directory. A solid communication plan ensures CISOs and their teams can minimize costly downtime.<\/p>\n<p>\u201cThis Cybersecurity Awareness Month, let\u2019s commit to shifting our focus. Let\u2019s stop selling cybersecurity as an avoidance tool and start championing it as a business enabler built on the foundation of resilience.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<h4><strong><a href=\"https:\/\/www.linkedin.com\/in\/carolynduby\/\" target=\"_blank\" rel=\"noopener\">Carolyn Duby, Field CTO and Cyber Security AI Strategist at Cloudera<\/a><\/strong><\/h4>\n<p>\u201cAI is driving up the volume and value of enterprise data, and cyber-criminals are matching its speed. As organizations operate across increasingly sprawling data environments, multiple platforms, each enforcing its own security and governance models, add to the complexity and inconsistency of controls within the system. This creates data silos and leaves sensitive data vulnerable, as there is no confirmation of who has access to it or how it is used.<\/p>\n<p>\u201cThis lack of visibility creates a perfect opportunity for attackers and a significant liability for enterprises navigating stricter regulatory oversight. The solution to this is robust data governance, which encompasses consistent guardrails for access, accountability, and control throughout the entire lifecycle. During Cybersecurity Awareness Month, organizations have a duty to assess whether visibility and governance are being utilized correctly as the foundation of their resilience.<\/p>\n<p>\u201cYou cannot defend what you cannot see. Cybersecurity begins with a clear line of sight into where data resides, who interacts with it, and under what circumstances. Yet storing data across multiple environments compounds this challenge. Security teams must manage multiple complex models simultaneously, often becoming \u2018jack of all trades but master of none.\u2019 The result is blind spots, gaps in monitoring, and frustrated users who may try to bypass cumbersome policies, which might lead to data leaks.<\/p>\n<p>\u201cUnified visibility enables organizations to detect anomalies, assess risk exposure, and prevent breaches before they occur. Governance frameworks that consolidate data across environments eliminate blind spots and give security teams a single, consolidated view of activity.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/billdunnion\/\" target=\"_blank\" rel=\"noopener\"><strong>Bill Dunnion, Chief Information Security Officer at Mitel<\/strong><\/a><\/h4>\n<p>\u201cSecurity teams today are navigating an environment where critical infrastructure is under constant pressure. Attackers understand that disrupting communications, transportation, or healthcare systems can cause significant operational and community impact, making these networks prime targets. The challenge is that these systems are often complex and rapidly evolving, with new technologies layered on top of legacy environments. That complexity means small gaps can quickly become big risks. The focus must be on visibility, detection, and the ability to respond quickly, because resilience is not just a future goal. It is what keeps essential services running safely every day.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/ryan-edge-056a2231\/\" target=\"_blank\" rel=\"noopener\"><strong>Ryan Edge, Director of Strategy, Privacy, and Data Governance at OneTrust<\/strong><\/a><\/h4>\n<p>\u201cRealistically, shadow AI will happen regardless of how strong a company\u2019s policies are. Many companies are still in the process of rolling out enterprise solutions, and in the meantime, employees are experimenting with them. There is a clear urgency to figure out how AI tools can help people work better, faster, or in some cases, achieve something that wasn\u2019t possible before. What matters most is how quickly an organization can identify, assess, and govern shadow AI. The reason it poses such a threat to the business is that AI can directly ingest sensitive data and make decisions without oversight. AI doesn\u2019t operate in a silo, and issues can magnify quickly. Small decisions or inputs can scale into regulatory or ethical issues very quickly.<\/p>\n<p>\u201cFor some organizations, shadow AI creeps up when governance teams can\u2019t move fast enough to approve safe AI use. Data teams might decide to leave privacy and risk stakeholders out of the project altogether if they\u2019re viewed as speed bumps.<\/p>\n<p>\u201cWhile business teams may not intentionally bypass privacy and risk management teams, these stakeholders know that inefficient processes can impact the speed at which they can innovate. This presents a clear opportunity for governance teams to demonstrate their AI readiness and serve as a driver of innovation. If they can accelerate their risk reviews, embed controls, and automate how they detect AI use throughout the business, they can shift more of their time to strategic AI advisory and earn a seat at the table, rather than chasing unsolicited AI use.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/devinertel\/\" target=\"_blank\" rel=\"noopener\"><strong>Devin Ertel, Chief Information Security Officer at Menlo Security<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p dir=\"ltr\">\u201cThe browser is the most critical and vulnerable application in today\u2019s enterprise.<a href=\"https:\/\/insightjam.com\/posts\/%3Ca%20href='https%3A\/\/url.us.m.mimecastprotect.com\/s\/Dr8TC9rpDVIJK2OoFofEtqO4CC?domain=menlosecurity.com%27%3Ehttps%3A\/\/url.us.m.mimecastprotect.com\/s\/Dr8TC9rpDVIJK2OoFo...%3C\/a%3E\" target=\"_blank\" rel=\"noopener\">\u00a0Menlo Security\u2019s latest report<\/a> highlights that web traffic to generative AI sites surged 50 percent year-over-year to 10.53 billion visits in January 2025, with 80 percent of that activity happening directly in browsers. This makes the browser not just the primary gateway to AI tools, but also the main channel through which sensitive data and potential threats now flow. At the same time, 68 percent of employees are using free AI tools with personal accounts, and more than half are pasting sensitive corporate data into them, creating major risks of data leakage.<\/p>\n<p dir=\"ltr\">\u201cAI is amplifying both opportunity and risk. While employees rely on it to be more productive, attackers are using the same technology to spin up convincing phishing sites, fake domains, and ransomware delivery mechanisms at scale. With more than 6,500 GenAI domains and 3,000 apps already active, the browser has become the frontline battleground for security teams.<\/p>\n<p dir=\"ltr\">\u201cThat\u2019s why this year\u2019s Cybersecurity Awareness Month theme, \u2018Stay Safe Online,\u2019 resonates so strongly. Security leaders can\u2019t stop AI adoption, but they can govern it responsibly, deploying secure browsers, enforcing true zero-trust access, and eliminating shadow AI with sanctioned, safe tools. Modernizing browser security isn\u2019t just about compliance, but about protecting the workforce where they live and work today, which is online.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<h4 dir=\"ltr\"><a href=\"https:\/\/www.linkedin.com\/in\/jeremyfong\/\" target=\"_blank\" rel=\"noopener\"><strong>Jeremy Fong, VP Product at Opswat<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p>\u201cAs the 22nd annual Cybersecurity Awareness Month urges us to \u2018Secure Our World,\u2019 the speed at which data moves is as important as the integrity with which it is managed. File transfers remain one of the most common and most vulnerable points of exposure. In the AI era, where adversaries weaponize automation to embed malicious content or bypass traditional defenses, organizations cannot afford to treat this as routine infrastructure.<\/p>\n<p>\u201cManaged File Transfer (MFT) should be seen not as a legacy technology or need but as a strategic control solution. Its value lies in verifiable security: encryption, access policies, file scanning, and auditable trails that demonstrate accountability. These capabilities are increasingly non-negotiable, as regulators, from the SEC to the EU\u2019s DORA, demand provable safeguards.<\/p>\n<p>\u201cTo \u2018Secure Our World\u2019 year-round, leaders should take three actions:<\/p>\n<ol>\n<li>Elevate the secure file transfer conversation to the boardroom. It is a trust and resilience issue, not just an IT concern.<\/li>\n<li>Mandate consistent controls across cloud, hybrid, and on-prem environments, including secure transport and encryption at rest to protect confidentiality, and file scanning to prevent hidden threats.<\/li>\n<li>Continuously test and adapt processes to anticipate AI-driven threats.<\/li>\n<\/ol>\n<p>\u201cSecuring how data moves is securing how business operates. In an era defined by speed, complexity, and growing cyber risk, MFT is not optional but foundational to long-term resilience and trust, exactly the kind of proactive measure Cybersecurity Awareness Month urges every organization to adopt.\u201d<\/p>\n<\/div>\n<\/div>\n<hr>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/petergalvin\/\" target=\"_blank\" rel=\"noopener\"><strong>Peter Galvin, Chief Growth Officer at NMI<\/strong><\/a><\/h4>\n<p>\u201cCybersecurity awareness month is a great reminder that payment security is never one-and-done; it\u2019s a constant race to stay ahead of fraudsters. Today, the two primary threats we face in online payments are fraud and compliance. Criminals are already using AI to crack outdated defence practices, but the irony here is that businesses must fight AI with AI. Payment fraud will continue to evolve with technological innovations, so the only way to protect merchants and consumers is with layered defenses that adapt in real-time. Tokenization, biometrics, passkeys, fraud detection tools, and strong underwriting all play a role. Still, true protection comes from a \u2018security in depth\u2019 approach, which involves layering tools such as AI fraud detection for both pre- and post-transaction verification, 3DS, and enhanced merchant vetting.<\/p>\n<p>\u201cThe payment industry should see Cybersecurity Awareness Month as more than just a checklist; it\u2019s a call to action. Too many companies still hesitate to adopt proven tools like tokenization because of the perceived complexity, but the cost of inaction is far greater and could come with a hefty cost. Security is about striking the right balance, keeping fraudsters out while keeping the customer experience seamless. Ultimately, the goal is to protect merchant and consumer trust, because once trust in payments is lost, everything else falls apart.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/mike-g-0088131\/\"><strong>Mike Geehan,<\/strong> Head of Security, Compliance, and Corporate IT at Cockroach Labs<\/a><\/h4>\n<p>\u201cYes, Cybersecurity Awareness Month can serve as a reminder to reset passwords and brush up on the latest in phishing best practices, but it\u2019s an equally important time to revisit your organization\u2019s approach to resiliency. Availability is one of the core pillars of the information security triad, so resiliency is vital to a business\u2019s security strategy. Outages, cyber-attacks, unexpected vulnerabilities, or other events that cause unplanned downtime can test your defenses and expose any weaknesses in your infrastructure. Executives should take a step back and ask some simple questions: How resilient is our technical infrastructure under stress? Where are the weak spots? And are we testing them on a regular basis?<\/p>\n<p>\u201cBuilding scalable infrastructure is critical, but equally important is ensuring that scalability doesn\u2019t introduce new vulnerabilities. Take a traditionally security-specific concept, zero trust. Apply the concept holistically across an organization\u2019s entire architecture. Assume failure and breaches will happen, and build resilience at all levels of the ecosystem. Cybersecurity Awareness Month, as a lead-in to the new year, is the perfect time, aside from yesterday, to review compliance requirements, stress test your architecture, and continue to reinforce resilience. Prepare your organization to respond, not react to whatever 2026 has in store.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/matan-g-19796a1b7\/\" target=\"_blank\" rel=\"noopener\"><strong>Matan Getz, CEO and Co-Founder of Aim Security<\/strong><\/a><\/h4>\n<p>\u201cThe pace of AI adoption has outpaced security, leaving many organizations exposed. Defenses must shift from ad\u2011hoc fixes to continuous protection that spans the full AI lifecycle. That means validating every input, governing use through clear policies, monitoring in real-time, and securing both the code and the integrations behind it. Trust in AI will depend on whether companies can see, control, and secure every point where they use, build, or run it \u2014 before attackers do.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/david-gildea-5b54341a\/\" target=\"_blank\" rel=\"noopener\"><strong>David Gildea, Vice President of Product and AI at Druva<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p id=\"isPasted\" dir=\"ltr\"><em><strong>The Real Security Threat in AI<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u201cEarly on, the common security concerns around AI were rooted in fear, uncertainty, and misconceptions. For example, some were worried that AI might expose sensitive data, but in reality, most corporate data is heavily cleansed, and only a small fraction is valuable for model training.<\/p>\n<p dir=\"ltr\">\u201cThe real security challenge lies not just with the LLM, but with agentic AI frameworks, where tasks are delegated across dozens or even hundreds of AI agents. Most security teams are focusing on locking down data flows across LLMs, but the bigger threat is the swarm of AI agents making decisions and trading data at machine speed. These systems are too complex for humans to track quickly and nearly impossible to police with current security frameworks.\u201d<\/p>\n<p dir=\"ltr\"><em><strong>Building a New Foundation for Agentic Security<\/strong><\/em><\/p>\n<p dir=\"ltr\">\u201cAddressing this risk requires more than duct-taping existing frameworks\u2013it demands a new security foundation built for agentic systems. To manage this complexity, new specifications are emerging to provide the necessary controls.<\/p>\n<p dir=\"ltr\">\u201cFor example, standards like SPIFFE (Secure Production Identity Framework for Everyone) are being discussed to provide a strong, verifiable identity for each individual agent. Building on this, new proposals like the OAuth \u2018Identity Assertion Authorization Grant\u2019 are being developed specifically to handle how agents are granted access to resources.<\/p>\n<p dir=\"ltr\">\u201cThis combination of verifiable identity and delegated authorization is crucial for enterprises to securely:<\/p>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Track individual agents and their actions throughout their lifecycle.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Grant and monitor specific, fine-grained permissions for each agent.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Gain detailed observability into multi-agent chains, where each agent needs access to different capabilities.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Instantly revoke an agent\u2019s access if its delegator\u2019s permissions change or if the agent starts performing actions it shouldn\u2019t.<\/p>\n<\/li>\n<\/ul>\n<p dir=\"ltr\">Ultimately, we don\u2019t just need a technology solution, but a holistic shift in security mindset to properly govern the next wave of AI.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/darrenguccione\/\" target=\"_blank\" rel=\"noopener\"><strong>Darren Guccione, CEO and co-founder at Keeper Security<\/strong><\/a><\/h4>\n<p>\u201cSince 2004, Cybersecurity Awareness Month has served as a reminder that protecting our nation\u2019s digital infrastructure is inseparable from protecting our physical infrastructure. Nation-state adversaries and organized cyber-criminals are launching more frequent and more sophisticated attacks than ever before, making agencies like the Cybersecurity and Infrastructure Security Agency (CISA) vital to our collective defense.<\/p>\n<p>\u201cThe majority of U.S. digital infrastructure is owned and operated by the private sector, placing businesses directly on the front lines of this battle. Public-private collaboration is no longer optional\u2013it is essential. By sharing real-time threat intelligence, advancing zero-trust security models, and implementing modern Privileged Access Management (PAM) solutions, organizations can support our government agencies in strengthening our digital borders and protecting the systems that power our society.<\/p>\n<p>\u201cA unified approach\u2013with government and private industry working side by side\u2013is the only way to stay ahead of today\u2019s adversaries and tomorrow\u2019s unknown threats. By embracing this collaboration and prioritization of cybersecurity as a national security imperative, we can build a more resilient future for all.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/suboguha\/\" target=\"_blank\" rel=\"noopener\"><strong>Subo Guha, Senior Vice President of Product Management at Stellar Cyber<\/strong><\/a><\/h4>\n<p>\u201cFor Cybersecurity Awareness Month, Stellar Cyber is reminding everyone if it seems too good to be true, don\u2019t click it. Nearly 73 percent of Americans have experienced an online scam or attack. Cybersecurity isn\u2019t just a tech problem, we all have a responsibility to build better digital instincts and make safer online choices.<\/p>\n<p>\u201cSafe practices to follow:<\/p>\n<ul>\n<li>Check Who Sent It: If you get a message from someone you don\u2019t know or the number looks suspicious, don;t click on anything!<\/li>\n<li>Watch for Red Flags: Fake texts often have mistakes such as bad spelling, odd grammar or urgent language saying \u2018Hurry!\u2019 or \u2018Do this now!\u2019 They might also promise you prizes or threaten you into clicking.<\/li>\n<li>Keep Your Info Secret: Never share personal information through text or email. Legitimate organizations never ask for sensitive info this way.<\/li>\n<\/ul>\n<p>\u201cSenior citizens are a frequent target of online scams,but research shows that Gen Z is now the most at risk. Let\u2019s all help each other stay safe and spread awareness!\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/elyse-gunn\/\" target=\"_blank\" rel=\"noopener\"><strong>Elyse Gunn, Chief Information Security Officer (CISO) at Nasuni<\/strong> <\/a><\/h4>\n<p>\u201cAs cybersecurity threats become increasingly complex and widespread (67 percent of organizations report at least one cyber-attack in the past year), Cybersecurity Awareness Month is vital in reminding leaders of the actions needed to keep their businesses secure. As these threats become more common, the role of cybersecurity leaders has evolved. Where security teams once took a more cautious stance toward new technologies, they are now driving innovation, working alongside business leaders to find secure and strategic ways to adopt tools that strengthen both protection and performance.<\/p>\n<p>\u201cRecognizing security as a core business function and embedding risk management across product design, culture, and decision-making allows organizations to adopt AI, cloud platforms, and emerging technologies with greater confidence. The organizations most at risk are those that are slow to adapt, which is why preparedness across people, processes, and technology is essential. As AI and cloud transformation reshape the enterprise, strong oversight and governance must ensure accountability and data protection, particularly as unstructured data volumes continue to grow. Ultimately, resilience is a shared responsibility among executives, employees, and partners. Every stakeholder plays a role in safeguarding data and sustaining the culture of vigilance that keeps organizations both protected and ready to evolve.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/benjamin-harris-sg\/\" target=\"_blank\" rel=\"noopener\"><strong>Benjamin Harris, CEO and Founder of watchTowr<\/strong><\/a><\/h4>\n<p>\u201cAttackers are moving faster than ever. The time from disclosure to in-the-wild exploitation has never been shorter\u2014in most cases, measured in hours, not days. That speed gives adversaries a huge advantage: they can slip in, drop backdoors, and establish persistence before security teams have even finished testing and rolling out a patch.<\/p>\n<p>\u201cThat\u2019s why patching alone is no longer a measure of resilience. If your only defense is \u2018how quickly can we patch,\u2019 you\u2019re already playing catch-up. Think about it: fixing the lock on your front door doesn\u2019t help if an intruder has already made a copy of the key and is coming and going as they please.<\/p>\n<p>\u201cCybersecurity resilience today means the ability to react rapidly to emerging threats, not just patch, but detect compromise attempts, contain intrusions, and neutralize backdoors before attackers can fully capitalize. The organizations that succeed are the ones that treat rapid reaction to emerging threats as a broader capability and incident response rather than patching alone.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/chris-hosking-b4550417\/\" target=\"_blank\" rel=\"noopener\"><strong>Chris Hosking, AI and Cloud Security Evangelist at SentinelOne<\/strong><\/a><\/h4>\n<p>\u201cCybersecurity Awareness Month is not just a time to celebrate AI breakthroughs, but a reminder that innovation without security can undermine the very progress AI promises to deliver. This risk is heightened by the sudden rise of AI agents, which are reshaping cybersecurity faster than most organizations can keep up. The question is no longer how to use agents, but how to secure them. Agentic AI has moved rapidly from theory to reality, but unless controls keep pace, innovation without security can compromise the safety and security of operations.<\/p>\n<p>\u201cAs security teams develop AI-powered lines of defense, attackers are weaponizing the same advancements. Unsecured AI adoption leaves the door wide open to data leaks, malicious prompt injections and model exploitation. Organizations must have complete visibility into where AI agents are deployed and what data they can access \u2013 teams can only secure what they can see. Armed with end-to-end visibility, organizations can then deploy the policy-driven controls, guardrails, and real-time monitoring needed to outpace evolving threats. The organizations that succeed will be those that pair innovation with discipline, securing AI from the start rather than bolting on protection after the fact.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/craig-jones-albanwr\/\" target=\"_blank\" rel=\"noopener\"><strong>Craig Jones, Chief Security Officer at Ontinue<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p dir=\"ltr\">\u201cCyber threats are evolving faster than ever. From MFA-bypassing identity attacks to the resurgence of USB malware, the findings in <a href=\"https:\/\/insightjam.com\/posts\/%3Ca%20href='https%3A\/\/url.us.m.mimecastprotect.com\/s\/M6adCYEQyOfK4202f0fztx5TJf?domain=ontinue.com\/%27%3Ehttps%3A\/\/url.us.m.mimecastprotect.com\/s\/M6adCYEQyOfK4202f0...%3C\/a%3E\" target=\"_blank\" rel=\"noopener\">Ontinue\u2019s 1H 2025 Threat Intelligence<\/a>\u00a0report show that attackers are exploiting both advanced techniques and overlooked basics.<\/p>\n<p dir=\"ltr\">\u201cDefending against this landscape requires more than tools. It demands a balance of fundamentals, intelligence, and agility, and it requires raising cybersecurity awareness across the entire organization. Every employee plays a role in reducing risk, whether by recognizing phishing attempts, adhering to access policies, or avoiding unsafe practices such as plugging in personal USB devices.<\/p>\n<p dir=\"ltr\">\u201cStrong cybersecurity is no longer just an IT issue; it is a business differentiator. Customers, regulators, and partners all expect organizations to demonstrate resilience and transparency. A company-wide culture of security helps build trust while protecting operations. Here are five best practices every organization should prioritize:<\/p>\n<ol>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Fortify Identity Controls:\u00a0MFA alone is no longer enough. Implement phishing-resistant MFA, revoke stale tokens, and continuously monitor for anomalous login behavior.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Audit Cloud Persistence:\u00a0Adversaries are layering persistence in Azure and tampering with diagnostics to extend dwell time. Continuous auditing of app registrations, automation jobs, and privileged roles is essential.<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Reinforce the Basics: A 27 percent rise in USB malware shows that, unfortunately, old attack methods still work. Restrict removable media, reduce local admin privileges, and strengthen configuration hygiene.<\/p>\n<\/li>\n<\/ol>\n<ol start=\"4\">\n<li dir=\"ltr\">\n<p dir=\"ltr\">Manage Third-Party Risk: Nearly 30 percent of breaches stemmed from vendor compromise. Enforce strict partner standards and continuously monitor external access to your environment.<\/p>\n<\/li>\n<\/ol>\n<ol start=\"5\">\n<li dir=\"ltr\">\n<p dir=\"ltr\">Find the Right Managed Security Partner:\u00a0Automation accelerates detection and response, but it cannot replace human judgment. The right managed security partner combines AI-driven capabilities with expert analysts, helping organizations close the gap between the speed of attack and the speed of defense. This ensures security can scale as the business grows.<\/p>\n<\/li>\n<\/ol>\n<p dir=\"ltr\">\u201cCybersecurity is not a static project. It is a continuous process that requires adapting defenses as quickly as adversaries evolve their attacks. By focusing on these five priorities, organizations can build resilience against today\u2019s most pressing risks.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/cliffj\/\" target=\"_blank\" rel=\"noopener\"><strong>Cliff Jurkiewicz, VP of Global Strategy at Phenom<\/strong><\/a><\/h4>\n<p>\u201cAI tools like ChatGPT and other generative AI models are being used to create perfect resumes and job applications, making it easier for fraudsters to deceive employers. Legacy HR systems were built on supply chain models and are easily exploited by imposter candidates. Job seekers who are not what they seem can hinder an organization\u2019s ability to scale and grow into new markets, as well as hire top talent. The net effect of that can be devastating. You could literally go out of business.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/nicholaskathmann\/\" target=\"_blank\" rel=\"noopener\"><strong>Nicholas Kathmann, CISO at LogicGate<\/strong><\/a><\/h4>\n<p>\u201cShadow AI is one of the most significant threats facing enterprise cybersecurity today. The problem isn\u2019t just that employees are using unmanaged AI solutions\u2014today\u2019s SaaS tools often treat AI as an opt-out feature rather than an opt-in, automatically providing AI capabilities to employees who may not be aware of how to use it safely. Recent industry research paints a concerning picture: While <a href=\"https:\/\/mlq.ai\/media\/quarterly_decks\/v0.1_State_of_AI_in_Business_2025_Report.pdf\" target=\"_blank\" rel=\"noopener\">MIT\u2019s 2025 State of AI in Business report<\/a> found that over 90 percent of employees use LLMs regularly, <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">IBM\u2019s 2025 Cost of a Data Breach report<\/a> found that only about a third of organizations perform regular checks for unsanctioned AI use. Without proper AI oversight, your data is at risk\u2014and that ultimately puts your business at risk.<\/p>\n<p>\u201cWith IT and security leaders managing hundreds to thousands of different SaaS applications at a time, maintaining continuous visibility into all AI use within the organization can be a challenge. However, a variety of tools are available today that can help identify when, where, and how AI is being used, and then determine whether those uses are authorized or unauthorized. At the same time, AI awareness training, in combination with ongoing security awareness training, is necessary for educating employees on what constitutes acceptable AI use within your organization. This is a critical part of driving safe and effective AI use that benefits the business, rather than creating unnecessary risk. AI policies will vary by organization, but a strong AI governance program should prioritize the issue of shadow AI. After all, it\u2019s hard to limit risks your organization isn\u2019t even aware of.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/jason-keenaghan\/\" target=\"_blank\" rel=\"noopener\"><strong>Jason Keenaghan, Director of Product Management, IAM at Thales<\/strong><\/a><\/h4>\n<p>\u201cCybersecurity Awareness Month is a reminder that trust in our digital lives is only as strong as our weakest link, which in many cases is human error. While often unintentional, mistakes like reusing or sharing passwords, alongside phishing, are entry points for attackers to exploit stolen credentials to move deeper into networks. For decades, organizations have relied on passwords to safeguard computer systems, applications, etc., against unauthorized users. While passwords have served their purpose, they demand extra effort from users for proper hygiene.<\/p>\n<p>\u201cMost people struggle to create and remember complex, ever-changing passwords for the maze of systems they access daily, or feel frustrated by multifactor authentication, but passkeys are a significant leap in removing this burden. Using cryptographic techniques and biometric authentication, passkeys are harder to compromise, and when device-bound, they never leave the user\u2019s device, reducing the chance of threat actor interception. Synced passkeys remove the hassle of enrolling multiple times and make it simple for users to regain access if a device is lost or stolen.<\/p>\n<p>\u201cBuilding a passwordless strategy at the enterprise level doesn\u2019t just reduce risk at scale; it empowers employees to extend safer practices across both their professional and personal digital lives. Employees who practice secure habits in the workplace may be inspired to install extensions only from trusted sources, keep devices updated, and use passkeys for critical accounts like banking and email. Adoption may not happen overnight, but embracing passkeys today sets both businesses and consumers on the path toward a more secure, passwordless reality.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/doug-kersten-7437312\/\" target=\"_blank\" rel=\"noopener\"><strong>Doug Kersten, Chief Information Security Officer (CISO) at Appfire<\/strong><\/a><\/h4>\n<p>\u201cMany of today\u2019s AI-enabled threats are not entirely new\u2014they are amplified versions of long-standing attack vectors such as phishing, social engineering, and identity exploitation. What has shifted is their sophistication and credibility. Voice deepfakes and AI-generated messages can erode traditional trust signals, making awareness and vigilance critical. Organizations must return to fundamentals: control access, establish clear governance around SaaS and AI adoption, and equip security operations teams with the expertise and tools to recognize and mitigate AI-driven risks. The fundamentals of cybersecurity have not changed, but the urgency to apply them has intensified. Resilience in this moment depends less on reacting to every emerging tool and more on embedding proven practices into how we detect, respond, and protect.\u201d<\/p>\n<hr>\n<h4><strong><a href=\"https:\/\/www.linkedin.com\/in\/fouad-khalil-cisa\/\" target=\"_blank\" rel=\"noopener\">Fouad Khalil, Senior Director of Enterprise Security, Risk, and Compliance at Locus Robotics<\/a><\/strong><\/h4>\n<p>\u201cBusinesses today are tasked with not only managing an influx of sensitive data and various software and applications, but also an explosion in devices and the networks they\u2019re connected to. With a surge in access points, traditional network perimeters are no longer enough to keep businesses secure. Instead, modern threats require zero-trust architectures.<\/p>\n<p>\u201cThis is especially true for automated warehousing environments where data management, software systems, and digital network infrastructure are identified as key vulnerabilities. These environments introduce additional security considerations, like the need to prevent robots from connecting to the public internet, which requires additional security layers built in, like separate private networks. As warehouses continue to automate their operations, leveraging solutions that embed zero-trust architecture principles will be essential in keeping the industry secure.<\/p>\n<p>\u201cThis year\u2019s Cybersecurity Awareness Month theme of staying safe online underscores the use of best practices like leveraging strong passwords and multifactor authentication, which are all core principles of zero trust architecture.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/kiani\/\" target=\"_blank\" rel=\"noopener\"><strong>Khash Kiani, Head of Security, Trust, and IT at ASAPP<\/strong><\/a><\/h4>\n<p>\u201cGenerative AI is everywhere\u2014and most tools require access to your organization\u2019s most confidential data. This Cybersecurity Awareness Month, leaders need to go beyond the basics and understand the new wave of risks generative AI introduces. Everyone knows the general concept of cybersecurity, but few are prepared for emerging threats like prompt injection and data poisoning. These are subtle, dangerous, and often invisible ways in which AI systems can be manipulated.<\/p>\n<p>\u201cWith traditional deterministic software, security testing can identify most vulnerabilities. But with generative AI, the same reviews may miss nuanced risks\u2014like a malicious prompt hidden in customer feedback that bypasses controls, or two AI agents communicating in ways that leak sensitive data. Data poisoning poses another unique challenge: if attackers feed false or malicious information into your training data or knowledge sources, your AI can learn to behave incorrectly or even reveal private information later.<\/p>\n<p>\u201cAI security isn\u2019t just about protecting systems anymore\u2014it\u2019s about safeguarding the integrity of the intelligence you build.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/luban\/\" target=\"_blank\" rel=\"noopener\"><strong>Pete Luban, Field CISO at AttackIQ<\/strong><\/a><\/h4>\n<p>\u201cCyber threats to organizations have never been higher than they are in 2025. With powerful cyber-crime groups like Scattered Spider and ShinyHunters conducting attacks that span across the globe, as well as the proliferation of insider threats made possible by the integration of AI into attack vectors, organizations have become overwhelmed by the multitude of different angles they can be hit from.<\/p>\n<p>\u201cIt\u2019s time to start fighting back and get a step ahead of the actors who seem to have organizations beat at every turn. By studying the tactics that cyber-crime organizations or individual actors employ when breaching systems, security teams can train their defenses to recognize when those strategies are used against them and react accordingly. Utilizing adversarial emulation techniques helps cybersecurity platforms identify potential areas of exploitation and alert security teams to handle them swiftly.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/jon-l-930b10311\/\" target=\"_blank\" rel=\"noopener\"><strong>Jon Lucas, Co-Founder and Director at Hyve Managed Hosting<\/strong><\/a><\/h4>\n<p>\u201cIn 2025, we\u2019ve seen just how quickly a breach can unravel operations, revenue, and brand trust, from the $375 million hit to Marks &amp; Spencer to widespread attacks across the aviation sector.<\/p>\n<p>\u201cThe key takeaway for 2026 is that resilience must be the cornerstone of cybersecurity strategies. Businesses should prioritize layered defense mechanisms, like zero-trust access, segmented networks, continuous training, and fast recovery playbooks. At Hyve, we believe that companies that are prepared for disruption, rather than chasing perfection, are far better equipped to maintain operations under pressure. With new regulations like CIRCIA and NIS2 demanding rapid response, cyber readiness now extends beyond IT to legal and compliance teams. Recovery speed and organizational awareness will define cybersecurity success in 2026.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/andersonlunsford\/\" target=\"_blank\" rel=\"noopener\"><strong>Andy Lunsford, CEO and co-founder at BreachRx<\/strong><\/a><\/h4>\n<p>\u201cDecades of cybersecurity tradition have fed a dangerous delusion: thinking static incident response plans, buried in digital drawers, can protect organizations from the harsh reality of a real cyber crisis. When incidents hit, most teams improvise while their playbooks gather dust, exposing them to both outside threats and internal scrutiny.<\/p>\n<p>\u201cThe truth is, that paper plan is dead weight when a compromise occurs and executives need answers fast. Real-world resilience must be distributed, dynamic, and fully transparent. Every function\u2014from IT and legal to HR and communications\u2014needs a living playbook, clear ownership, and a culture built on practice and accountability. Document every move as it happens. Measure what matters: how fast teams detect, respond, and communicate.<\/p>\n<p>\u201cDitch the old playbook and build systems that truly prepare people for the moments that count. This is more than technical insurance; it\u2019s reputation management, operational survival, and the defining test of modern leadership.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/derekmanky\/\" target=\"_blank\" rel=\"noopener\"><strong>Derek Manky, Chief Security Strategist and Global VP of Threat Intelligence at Fortinet<\/strong><\/a><\/h4>\n<p>\u201cIn a year where threats have grown more automated, opportunistic, and relentless, two fundamentals remain critical: protecting against phishing and keeping software updated. These aren\u2019t new ideas, and Fortinet\u2019s 2025 Global Threat Landscape Report reveals why these basic actions continue to be the foundation of resilience. Attackers are increasingly using bots and machine-speed tools to scan for vulnerabilities and launch phishing campaigns at scale. This shift has made phishing more dangerous than ever.<\/p>\n<p>\u201cThe value of Cybersecurity Awareness Month is that it reminds us to take the time to turn research into action. Here are two practices reinforced by Fortinet\u2019s findings that we recommend everyone implement:<\/p>\n<ul>\n<li>\u201cStrengthen phishing awareness. Employees should be trained to pause before clicking, verify sender details, and report suspicious messages. And remember, multifactor authentication (MFA) provides an additional safety net when credentials are compromised.<\/li>\n<li>\u201cAutomate software updates where possible. Organizations should implement centralized patch management. For individuals, enabling automatic updates on personal devices helps eliminate the lag time between patch releases and applications.\u201d<\/li>\n<\/ul>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/kmariappan\/\" target=\"_blank\" rel=\"noopener\"><strong>Kavitha Mariappan, Chief Transformation Officer at Rubrik<\/strong><\/a><\/h4>\n<p>\u201cAs AI drives the next wave of digital transformation, Cyber Awareness Month reminds us that cyber resilience\u2014not just visibility\u2014is key to securing our digital future. AI is forcing leaders to transform their infrastructure and applications, and adopt more cloud, which makes cyber resilience the number one priority for cybersecurity.<\/p>\n<p>AI is also increasing identity and credential-based attacks\u2014now the most prevalent type of cyber-attack. Rather than hacking into systems, attackers are now simply logging in, leveraging unauthorized access to credentials. Enterprises need to focus on Identity Resilience, which is designed to secure the entire identity landscape alongside data and protect the most common entry points for attackers\u2014human and non-human identities (NHIs).\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/jimmymesta\/\" target=\"_blank\" rel=\"noopener\"><strong>Jimmy Mesta, Co-Founder and Chief Technology Officer at RAD Security<\/strong><\/a><\/h4>\n<p>\u201cCybersecurity Awareness Month tends to focus on consumer safety, and that\u2019s important, but it\u2019s only part of the story. Behind every phishing warning or software update prompt, there\u2019s a security team under pressure to make those defenses work at scale. That\u2019s where awareness breaks down: not at the user level, but in the complexity of the systems that support them.<\/p>\n<p>\u201cThe truth is, many security teams already know what needs fixing. The problem is bandwidth. They\u2019re overwhelmed with alerts, stuck reconciling disconnected tools, and buried under compliance work that\u2019s growing faster than their teams are.<\/p>\n<p>\u201cI believe that awareness has to include that layer too: the people behind the platform, not just the people using it. That means helping defenders focus on what matters, eliminate wasted motion, and translate technical insight into business action\u2014before it ends up as a headline.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/kunalmodasiya\/\" target=\"_blank\" rel=\"noopener\"><strong>Kunal Modasiya, Senior Vice President of Product, GTM, and Growth at Qualys<\/strong><\/a><\/h4>\n<p>\u201cRecent research reveals a troubling gap: while nearly half of organizations have formal cyber risk programs, only 30 percent align those efforts with business objectives. This disconnect leaves companies vulnerable, not just to technical breaches but to cascading impacts across operations, finances, and reputation. To close this maturity gap, security leaders must move beyond legacy metrics, such as CVSS scores, and adopt a unified risk framework, such as a Risk Operations Center (ROC)\u2014one that continuously correlates vulnerability data, asset context, and threat exposure. This will enable smarter prioritization and faster, more meaningful remediation.<\/p>\n<p>\u201cCybersecurity Awareness Month is a timely reminder: resilience is not just about tools and frameworks. It\u2019s about context, clarity, and collaboration. Business leaders must ensure their 2026 cybersecurity strategy reflects this shift, investing in workforce enablement, governance, and technologies that align security with what truly matters to the business.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/vasum\/\" target=\"_blank\" rel=\"noopener\"><strong>Vasu Murthy, CPO at Cohesity<\/strong><\/a><\/h4>\n<p style=\"text-align: justify;\">\u201cThe age of AI-powered attacks is here, and legacy tools simply can\u2019t keep pace. This Cybersecurity Awareness Month, we must recognize that the next race in cybersecurity is AI versus AI. Forward-thinking organizations are now leveraging AI on two fronts: to better defend and recover against attacks, and to deliver clean, governed data that securely unlocks their data assets to fuel innovation. This isn\u2019t just about better defense; it is about fueling innovation with cyber resilient data strategies.\u201d<\/p>\n<hr>\n<h4><strong><a href=\"https:\/\/www.linkedin.com\/in\/renukanadkarni\/\" target=\"_blank\" rel=\"noopener\">Renuka Nadkarni, Chief Product Officer at Aryaka<\/a><\/strong><\/h4>\n<p>\u201cCybersecurity Awareness Month\u2019s theme of Building a Cyber Strong America underscores that resilience is not just a government or enterprise issue, it\u2019s a shared responsibility across every sector and individual. From protecting small businesses against ransomware to securing critical infrastructure to empowering citizens with practical habits like MFA, patching, and phishing awareness, the focus is on collective strength. By aligning education, technology, and collaboration, we create a layered defense that not only reduces risk but also reinforces national security and trust in the digital economy.<\/p>\n<p>\u201cToday\u2019s interconnected world means a single weak link can ripple across industries and borders. It\u2019s all about closing those gaps, whether it\u2019s addressing supply chain risks, securing remote work, or ensuring public and private sectors work hand in hand. By embracing proactive defense strategies, investing in cyber skills, and making security part of daily culture, America can move from being reactive to truly resilient in the face of evolving threats.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/elizabethnammour\/\" target=\"_blank\" rel=\"noopener\"><strong>Elizabeth Nammour, Founder and CEO of Teleskope<\/strong><\/a><\/h4>\n<p>\u201cThis October marks the 22nd annual \u2018Cybersecurity Awareness Month.\u2019 As we consider the cybersecurity landscape, we must also take into account the rapid acceleration of AI adoption and the increasing amount of sensitive information being ingested and exposed in unexpected ways.<\/p>\n<p>\u201cIDC projects global data volume will reach 181 zettabytes by 2025, meaning this rapid data sprawl is now one of the most urgent challenges in cybersecurity. Organizations now store petabytes of data across hundreds of fragmented systems, with limited visibility into what exists, where it resides, who can access it, or how it\u2019s being used. Furthermore, many of the data security tools designed to solve this problem stop at visibility without offering any context or solution behind the countless threats these security teams, who are often stretched thin, face each day.<\/p>\n<p>\u201cCybersecurity Awareness Month is a good reminder of the community\u2019s responsibility to make solutions that are equipped to not only solve the problems of today, but tomorrow as well. This means going beyond basic visibility and ineffective security alerts and focusing on giving security teams what they need\u2014accurate discovery, immediate enforcement, and scalable automated remediation, so enterprises can not only see their risks but resolve them at scale.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/apupavithran\/\" target=\"_blank\" rel=\"noopener\"><strong>Apu Pavithran, CEO and Founder at \u2060Hexnode<\/strong><\/a><\/h4>\n<p>\u201cCyberattacks are no longer a burden IT can shoulder alone, especially now with Generative AI supercharging phishing and social engineering attacks. A quarterly security awareness seminar is, quite simply, a relic of the past. Employees need hands-on, simulation-based training that mirrors the sophistication of real-world attacks. When these drills are woven into daily workflows, people develop the instincts to pause, question legitimacy, and respond with discipline. That\u2019s when training stops being theoretical, transforming awareness into action and action into habit.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/gunnarpeterson\/\" target=\"_blank\" rel=\"noopener\"><strong>Gunnar Peterson, CISO at Forter<\/strong><\/a><\/h4>\n<p>\u201cThe resilience of digital infrastructures largely hinges on how well businesses secure the identity systems at the heart of online commerce. As AI agents increasingly act on behalf of consumers, merchants face a critical test: how to welcome automation as a business driver without opening the door to fraudsters exploiting the same tools. Outdated defenses, such as static authentication checks or CAPTCHA, no longer provide meaningful protection. True resilience comes from pairing layered protection with adaptive detection\u2014capturing richer identity signals, monitoring them continuously, and ensuring authentication cannot be manipulated into a vulnerability.<\/p>\n<p>\u201cBy adopting detection-driven security and leveraging global intelligence networks, businesses not only reduce fraud risk but also strengthen the foundation of digital commerce. In doing so, they help protect both customers and the broader economy.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/steve-povolny-595a776\/\" target=\"_blank\" rel=\"noopener\"><strong>Steve Povolny, Senior Director of Security Research at Exabeam<\/strong><\/a><\/h4>\n<p>\u201cCybersecurity Awareness Month underscores a critical, often underestimated reality: insider threats represent the most dangerous risk to organizations today. According to Exabeam research, 64 percent of cybersecurity leaders agree that insider threats are more dangerous than external actors, and the risk is intensifying. With the rise of generative AI, two of the top three insider threat vectors are now AI-related.<\/p>\n<p>\u201cDespite this rising threat, most organizations remain underprepared. Eighty-eight percent of security leaders say they lack the behavioral analytics needed for early detection. Meanwhile, only 44 percent report using User and Entity Behavior Analytics (UEBA), a key capability for identifying abnormal activity and compromised credentials before they lead to serious incidents. Insider threats have evolved. They\u2019re faster, more sophisticated, and increasingly AI-enabled. Security operations need to evolve, too.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/joprisco\/\" target=\"_blank\" rel=\"noopener\"><strong>John Prisco, Quantum Consultant at Toshiba<\/strong><\/a><\/h4>\n<p>\u201cAs we approach Cybersecurity Awareness Month, there\u2019s a significant threat on the horizon that we must focus on\u2013quantum computers that will break much of today\u2019s cryptography.<\/p>\n<p>\u201cThe U.S. previously set a goal to get to post-quantum cryptography (PQC) by 2030. This is essential to achieve, but the danger is that PQC alone is not enough. A purely algorithmic \u2018safe\u2019 cipher can still be cracked with time and computing power. That\u2019s where Quantum Key Distribution (QKD) comes in, armed with physics-based security. To be prepared for a quantum-safe future, a hybrid approach of PQC and QKD is vital.<\/p>\n<p>\u201cA cryptosystem is considered to have information-theoretic security if the system is secure against adversaries with unlimited computing resources and time. In contrast, a system that depends on the computational cost of cryptanalysis to be secure is called computationally secure or conditionally secure. For example, QKD has information-theoretic security, while PQC is computationally secure (conditionally secure).<\/p>\n<p>\u201cIf we fail to act, we risk a \u2018harvest now, decrypt later\u2019 scenario, in which hackers siphon encrypted data today and wait until quantum computers can break it. In that case, what appears secure now may become vulnerable to a future breach. Ultimately, it\u2019s on industry leaders to build a defense now, before the threat becomes unmanageable in the near future.\u201d<\/p>\n<hr>\n<h4><strong><a href=\"https:\/\/www.linkedin.com\/in\/ravit-sadeh-0484913b\/\" target=\"_blank\" rel=\"noopener\">Ravit Sadeh, VP Product Management at CTERA<\/a><\/strong><\/h4>\n<p>\u201cCyberattacks unfold in seconds, while our distracted, fast-paced routines often leave us exposed. It\u2019s not that people ignore cybersecurity\u2014most of us know the basics of avoiding suspicious links and shady websites. The real risk comes when we\u2019re multitasking: replying instantly to what looks like a boss\u2019s urgent email, downloading a new AI tool in the rush to finish a presentation, or skimming messages while on the move. In 2025, impulsivity has become the new vulnerability.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/stephanie-keinz-schneider-764aa652\/\" target=\"_blank\" rel=\"noopener\"><strong>Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass<\/strong><\/a><\/h4>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<p>\u201cOnline threats are evolving fast. From artificial intelligence (AI)-powered phishing to infostealer campaigns and weak-credential exploits, it can be easy to feel like you\u2019ve lost control of your digital footprint. Cybersecurity Awareness Month is an opportunity for us to learn and reflect on the everyday habits that could put us at risk, and make improvements that keep us safe all year long.<\/p>\n<p>\u201cWith more informed browsing, a discerning eye, and minor habit shifts, anyone can put up a fortress around their online presence. Stay vigilant with links, especially those tied to unexpected or urgent messages. Always verify the source of messages, think before you click, and never share personal information unless it\u2019s with an authenticated source. Protect your credentials with a password manager, and, on top of that, upgrade to passkeys, a passwordless login method praised for its security and simplicity. Use this month to learn about the latest threats and strengthen the everyday practices that lock down your personal information.\u201d<\/p>\n<hr>\n<\/div>\n<\/div>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/darrenshou\" target=\"_blank\" rel=\"noopener\"><strong>Darren Shou<\/strong><strong>, Chief Strategy Officer at\u00a0<\/strong><strong>RSAC<\/strong><\/a><\/h4>\n<p>\u201cAs CISA braces for potential furloughs during a government shutdown, the moment underscores a deeper issue: most small and mid-sized businesses have little clarity on which federal agency to call when ransomware strikes. Is it CISA, the FBI, or the Secret Service, and in what order? This uncertainty fuels a dangerous preparedness gap for SMBs, who represent nearly all U.S. businesses and a significant share of the economy. Cybersecurity Awareness Month is the perfect time to call for a clearer realignment between government and the private sector, rooted in step-by-step guidance and consistent communication. It\u2019s essential if we want to move cyber awareness beyond phishing emails and into true incident response readiness.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/nigel-tan-bb4bba7\/\" target=\"_blank\" rel=\"noopener\"><strong>Nigel Tan, Director at Delinea<\/strong><\/a><\/h4>\n<p>\u201cThe attack surface is changing, and the rise of machine identities is at the center of it. From chatbots to APIs and autonomous agents, they already outnumber humans 46 to 1\u2013yet they\u2019re too often overlooked. Securing these identities is now just as critical as protecting human ones.<\/p>\n<p>\u201cThe recent Salesloft breach proved the risk. Attackers didn\u2019t target staff logins; instead, they exploited an AI-powered chatbot\u2019s privileged access, gaining entry into systems such as AWS and Slack. With less than half of organizations (44 percent) across the globe reporting that their security architectures are equipped to fully support secure AI, the gap is clear.<\/p>\n<p>\u201cCybersecurity Awareness Month is the moment to act. As machine identities increasingly become entry points for attackers, start with visibility into where they are and what they can access. Then shorten credential lifespans so stolen details quickly expire and restrict each identity\u2019s access to only what it truly needs. Treating machine identities with the same priority as human ones is essential to business resilience.\u201d<\/p>\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/nicholas-tausek-6ab41611\/\" target=\"_blank\" rel=\"noopener\"><strong>Nick Tausek, Lead Security Automation Architect at Swimlane<\/strong><\/a><\/h4>\n<p>\u201cThis Cybersecurity Awareness Month provides an opportunity for us to turn our heads towards the future of threat defense. The integration of agentic AI is quickly emerging as the next critical threshold for cybersecurity platforms, one that organizations must cross to keep pace with adversaries already exploiting these capabilities for malicious gain.<\/p>\n<p>\u201cBy automating Tier-1 tasks like initial incident response, preliminary evidence analysis, and documentation, agentic AI significantly reduces the workload on SOC analysts. This not only alleviates resource constraints but also allows security teams to reallocate their time and expertise toward advanced threat prevention and strategic risk reduction. Ultimately, embracing agentic AI strengthens an organization\u2019s overall security posture, transforming awareness into action and helping defenders stay one step ahead.\u201d<\/p>\n<hr>\n<h4><strong><a href=\"https:\/\/www.linkedin.com\/in\/pauldavidwalker\/\" target=\"_blank\" rel=\"noopener\">Paul Walker, Field Strategist at Omada<\/a><\/strong><\/h4>\n<p>\u201cWhen we think about identity in cybersecurity, we instinctively think of people. But that picture has shifted dramatically. In most organizations today, non-human identities\u2014service accounts, APIs, bots, workloads, and increasingly AI agents\u2014outnumber human identities by a huge margin. Research shows the ratio is roughly 82 to one. That\u2019s not just a matter of scale; it\u2019s a structural change in how identity works.<\/p>\n<p>\u201cOne of the biggest accelerators is the rise of Agentic AI. These autonomous or semi-autonomous agents carry out decisions and actions on behalf of a user or an organization, and need their own identities to authenticate, authorize, and interact across systems and data. Each one is effectively a new kind of actor in your digital ecosystem, and it has to be governed accordingly.<\/p>\n<p>\u201cBut non-human identities don\u2019t behave like human ones. They\u2019re created at high speed, live across hybrid and multi-cloud environments, and often connect directly into sensitive systems. They don\u2019t follow typical joiner\u2013mover\u2013leaver processes. They\u2019re dynamic and woven into orchestration, pipelines, and business decisions. Traditional IAM simply wasn\u2019t built for this complexity and unpredictability. That gap creates blind spots and an expanded attack surface. And with regulations like DORA and NIS2 demanding accountability for all identities, not just human ones, the urgency is clear.<\/p>\n<p>\u201cCybersecurity Awareness Month is a reminder: identity governance must now extend beyond people. Securing the vast, fast-moving ecosystem of non-human identities, especially AI-driven ones, is becoming central to resilience and trust.\u201d<\/p>\n<hr>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<h4 dir=\"ltr\"><a href=\"https:\/\/www.linkedin.com\/in\/kylewickert\/\" target=\"_blank\" rel=\"noopener\"><strong>Kyle Wickert, Field Chief Technology Officer at AlgoSec<\/strong><\/a><\/h4>\n<p id=\"isPasted\" dir=\"ltr\">\u201cWith <a href=\"https:\/\/insightjam.com\/posts\/%3Ca%20href='https%3A\/\/c02a491d.streaklinks.com\/Ckwiej_h4dWTFtDwmgOBnUpT\/https%3A%2F%2Fwww.algosec.com%2Fpdf%2Falgosec---case-for-convergence?utm_source=pressrelease&amp;utm_medium=email&amp;utm_campaign=convergencebook%27%3Ehttps%3A\/\/c02a491d.streaklinks.com\/Ckwiej_h4dWTFtDwmgOBnUpT...%3C\/a%3E\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"&lt;a href='https:\/\/www.google.com\/url?q=https:\/\/c02a491d.streaklinks.com\/Ckwiej_h4dWTFtDwmgOBnUpT\/https%253A%252F%252Fwww.algosec.com%252Fpdf%252Falgosec---case-for-convergence%253Futm_source%253Dpressrelease%2526utm_medium%253Demail%2526utm_campaign%253Dconvergencebook&amp;source=gmail&amp;ust=1757596486726000&amp;usg=AOvVaw1Q7KStMibR2QrPe71Pe_Vl'&gt;https:\/\/www.google.com\/url?q=https:\/\/c02a491d.streaklinks...&lt;\/a&gt;\">60 percent of organizations<\/a>\u00a0now managing at least 250 business applications across hybrid multi-cloud environments, relying on traditional firewall policy-based network security is no longer effective. Building security around networks and infrastructure creates blind spots, inconsistent policies, and a higher risk of misconfigurations and downtime. These challenges only intensify as more applications are deployed and existing applications require updates. Applications are the backbone of modern business, and security strategies need to be aligned accordingly.<\/p>\n<p dir=\"ltr\">\u201cTo address this, security teams must shift to strategies that start from the application outward rather than the network inward, beginning with mapping and identifying their existing business applications and connectivity flows. Application-centric security enables teams to identify and prioritize risks in real-time, reducing the likelihood of breaches and downtime while expediting remediation and streamlining delivery and updates, which are often slowed in traditional security. This approach not only protects applications but also accelerates their rollout and improvements over time.<\/p>\n<p dir=\"ltr\">\u201cAt the same time, there is a growing trend of convergence between cloud and network security teams, a shift that requires a unified approach to risk management. Application-centric security makes this possible with consistent visibility and policy enforcement across environments, teams, and tools. The result is greater clarity and control, empowering organizations to manage security holistically while staying aligned with modern business needs.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"detail-layout-content-wrapper\">\n<div class=\"detail-layout-description mighty-wysiwyg-content mighty-max-content-width fr-view\">\n<hr>\n<h4><a href=\"https:\/\/www.linkedin.com\/in\/markwojtasiak\/\" target=\"_blank\" rel=\"noopener\"><strong>Mark Wojtasiak, VP of Research and Strategy at Vectra AI<\/strong><\/a><\/h4>\n<\/div>\n<\/div>\n<p>\u201cAI is everywhere. It\u2019s powering the apps we use, transforming the way companies operate, and giving attackers faster, smarter ways to evolve their tactics. That makes \u2018staying safe online\u2019 more complicated than ever. Yes\u2014strong passwords, multifactor authentication, and software updates are still must-do basics. But the truth is, those everyday actions are now happening against a backdrop of AI-driven threats that move at machine speed.<\/p>\n<p>\u201cDefenders feel this shift. For the second year in a row, the vast majority (87 percent) say they\u2019ll lean more on AI to replace outdated detection and response tools. Why? Because legacy approaches can\u2019t keep up. SOC teams are drowning in alerts. Nearly half (44 percent) admit they\u2019re losing the battle to separate real threats from noise. And attackers know it.<\/p>\n<p>\u201cSo what does \u2018staying safe online\u2019 mean in an AI era? It means keeping the fundamentals, but pairing them with vigilance, awareness, and AI-driven defenses that can think and move as fast as attackers do. Because the adoption curve isn\u2019t slowing, AI is reshaping both offense and defense. The question then becomes: can we see them, can we stop them, and how fast can we do both?\u201d<\/p>\n<hr>\n<h4>Want more insights like these?\u00a0<a class=\"external\" href=\"https:\/\/insightjam.com\/share\/W9PNIZN-ugApeSN3?utm_source=manual\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Register for\u00a0<\/strong><em><strong>Insight Jam<\/strong><\/em><\/a>,\u00a0<em>Solutions Review\u2019<\/em>s enterprise tech community, which enables human conversation on AI.\u00a0<strong><a class=\"external\" href=\"https:\/\/insightjam.com\/share\/W9PNIZN-ugApeSN3?utm_source=manual\" target=\"_blank\" rel=\"noopener nofollow\">You can\u00a0gain access for free here!<\/a><\/strong><\/h4>\n<\/p>\n<p>The post <a href=\"https:\/\/solutionsreview.com\/cybersecurity-awareness-month-quotes-and-commentary-from-industry-experts-in-2025\/\">Cybersecurity Awareness Month Quotes and Commentary from Industry Experts in 2025<\/a> appeared first on <a href=\"https:\/\/solutionsreview.com\/identity-management\">Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, &amp; Services<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>For Cybersecurity Awareness Month 2025, the editors at Solutions Review have compiled a list of quotes, predictions, and commentary from leading experts across industries. As part of this year\u2019s Cybersecurity Awareness Month, we\u00a0invited the best and brightest minds in the enterprise technology market to share their best practices, predictions, and personal anecdotes about the impact of artificial intelligence on their careers, companies, and more. The&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15053\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":15054,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15053"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15053\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/media\/15054"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}