Phil Sweeney
philsweeneytt.bsky.social
Phil Sweeney
@philsweeneytt.bsky.social
industry editor for cybersecurity at Informa TechTarget
Reposted by Phil Sweeney
My post about identity & access management and IGA app integration got published in @darkreading.bsky.social! Lots of IGA app integration knowledge goodness. #identitysecurity www.darkreading.com/identity-acc...
November 17, 2025 at 8:35 PM
Reposted by Phil Sweeney
Scoop: CISA plans to embark on a hiring spree and change some workforce policies in an effort to rebuild its depleted ranks ahead of a possible conflict with China, according to a memo from its acting director that I obtained.

www.cybersecuritydive.com/news/cisa-hi...
CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
The agency will also change some of its workforce policies to avoid driving away talented staff.
www.cybersecuritydive.com
November 17, 2025 at 9:30 PM
Reposted by Phil Sweeney
Latest on @darkreading.bsky.social DR Technology: Operational Technology Security Poses Inherent Risks for Manufacturers https://zpr.io/7mWgDqPpVenr #DRTechnology #darkreading #cybersecurity
Operational Technology Security Poses Inherent Risks for Manufacturers
Despite increased awareness, manufacturers continue to face an onslaught of attacks.
zpr.io
November 5, 2025 at 3:38 PM
Reposted by Phil Sweeney
New Blog Alert! Omdia/Enterprise Strategy Group published new research on workforce identity security (AKA identity & access management), and this blog dives into the challenge of tool proliferation. Identity teams have an average of 11 discrete tools to juggle - www.techtarget.com/searchsecuri...
Identity security tool sprawl: Origins and the way forward | TechTarget
Identity security teams face tool sprawl with an average of 11 products. Read research insights on consolidation strategies and emerging platform approaches.
www.techtarget.com
October 8, 2025 at 12:03 PM
Reposted by Phil Sweeney
Hackers are using AI to improve their phishing lures, but AI isn't yet replacing their malware toolkits, according to a new report from Intel 471: www.cybersecuritydive.com/news/ai-phis...

OpenAI's latest threat report found a similar phenomenon: cyberscoop.com/openai-threa...
October 8, 2025 at 3:30 PM
Reposted by Phil Sweeney
New: China-linked hackers, including the most prolific threat group targeting the U.S., have been using stealthy malware to penetrate tech firms, SaaS providers, and legal-services orgs; steal sensitive data; and find software flaws, according to Google. www.cybersecuritydive.com/news/china-e...
September 24, 2025 at 2:01 PM
Effective cybersecurity is tantamount to business survival.
Enterprise Cybersecurity: A Strategic Guide for CISOs | TechTarget
Enterprise cybersecurity is a major priority -- and expense -- because of the size of the challenge. Learn how CISOs and security leaders meet the threat.
www.techtarget.com
August 4, 2025 at 2:28 PM
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. www.techtarget.com/searchsecuri...
Enterprise Cybersecurity: A Strategic Guide for CISOs | TechTarget
Enterprise cybersecurity is a major priority -- and expense -- because of the size of the challenge. Learn how CISOs and security leaders meet the threat.
www.techtarget.com
July 9, 2025 at 7:22 PM
As enterprise cybersecurity staffers scramble to shore up vulnerabilities, hackers and attackers seek out those same weak points. www.techtarget.com/searchsecuri...
Enterprise Cybersecurity: A Strategic Guide for CISOs | TechTarget
Enterprise cybersecurity is a major priority -- and expense -- because of the size of the challenge. Learn how CISOs and security leaders meet the threat.
www.techtarget.com
July 2, 2025 at 2:51 PM
Security researchers are warning that the outbreak of direct hostilities between Israel and Iran may soon lead to malicious cyberattacks against critical infrastructure sites in the U.S. from state-linked actors, hacktivist groups and cyber criminals. www.cybersecuritydive.com/news/us-crit...
US critical infrastructure could become casualty of Iran-Israel conflict
Researchers warn that Iran-aligned threat groups could soon target U.S. companies and individuals in cyber espionage or sabotage attacks.
www.cybersecuritydive.com
June 17, 2025 at 1:34 AM
Reposted by Phil Sweeney
New: Nearly all of CISA's top leaders — including 5 of its 6 operational divisions and 6 of its 10 regional offices — have left or are leaving this month, the agency's new deputy director told staff.

Exits are fueling worries about CISA's capabilities.

www.cybersecuritydive.com/news/cisa-se...
May 27, 2025 at 3:21 PM
Organizations face many challenges while finding cyber insurance, from silent cyber and policy exclusions to vendor selection and misrepresentation of security requirements.
www.techtarget.com/searchsecuri...
Tips to Find Cyber Insurance Coverage in 2025 | TechTarget
Finding cyber insurance coverage is difficult. Learn how to find a policy that covers your organization in the event of a ransomware attack or data breach.
www.techtarget.com
April 24, 2025 at 3:25 PM