About Chuck Faughnan

This author has not yet filled in any details.
So far Chuck Faughnan has created 4 blog entries.

The AI-on-AI Arms Race: Countering GenAI-Driven Malware Morphing

Expanded long-form draft with real-world reporting from Microsoft, OpenAI, Google, Unit 42, and CISA. Focuses on how AI compresses the attack lifecycle and why behavioral network detection matters.

By |2026-05-07T15:58:53+00:00May 5, 2026|Cybersecurity|0 Comments

Why Healthcare Breaches Keep Looking Like Insiders Even When They Aren’t

Recent healthcare breaches keep following the same pattern: valid credentials, trusted workflows, and behavior that looks authorized until impact is obvious. This article explains why insider-like behavior is the common denominator and why behavior-based cohort analysis matters more than signature-centric controls.

By |2026-04-20T21:05:00+00:00April 18, 2026|Uncategorized|0 Comments

The Unagentable Blind Spot: Why CISOs Need Network-Level Visibility in Healthcare

Hospitals cannot agent, patch, or safely scan every system that matters. This post explains why the resulting blind spot has become a CISO-level risk—and why network behavior is the control plane that closes it.

By |2026-04-14T17:44:56+00:00April 7, 2026|Cybersecurity|0 Comments
Go to Top