Author Archives: Jason Lewis
Top 10 Cybersecurity Predictions for 2026: A Framework-Driven Forecast
This document presents our Top 10 Cybersecurity Predictions for 2026. It is the culmination of a rigorous analytical process that included a reality check of 2025 forecasts, a comparative analysis of industry predictions, and a critical self-evaluation of our own models.
Our analysis of 2025 revealed that the industry is excellent at predicting what will happen but consistently underestimates when and how much. This forecast aims to correct that. We have adjusted for timeline optimism, accounted for threat volume underestimation, and replaced low-reliability regulatory speculation with higher-confidence predictions grounded in observable data.
These are not just guesses; they are framework-driven forecasts designed to be actionable, measurable, and reliable. They are organized into three key themes that will define the 2026 landscape: The Autonomous Threat, The Resilient Defense, and The Geopolitical Tech Stack. Continue reading
Critical Review: The Top 10 Cybersecurity Predictions of 2025 vs. Reality
Every year, the cybersecurity industry produces a deluge of predictions that shape strategy, influence budgets, and set market expectations. But how accurate are they? This report conducts a forensic analysis of the top 10 cybersecurity predictions made for 2025, comparing the forecasts from late 2024 against the documented reality of what transpired.
By critically evaluating where the industry was right, where it was wrong, and—most importantly—why, we can identify the systemic biases in our forecasting and build a more reliable model for the future. This is not just an academic exercise; it is a crucial accountability report that provides actionable lessons for leaders, strategists, and practitioners. Continue reading
Threat Intelligence Platforms as a razor
I’ve been thinking about Threat Intelligence (TI) and Threat Intel Platforms (TIP) lately. What makes a platform useful? What role should Threat Intel play? Does TI even matter? Just so we’re on the same page, Threat Intel is not just … Continue reading
APT meet PFT and AOA
Just to clarify, this post is about APT and I’m not trying to sell you something. Advanced Persistent Threat (APT) is the all the buzz these days. It’s become an all-encompassing term to describe just about any covert intrusion in … Continue reading
Open letter to Sprint
I’m a T-Mobile customer. I’m distraught that ATT is on track to purchase the company. In a word, ATT sucks. If the deal happens, I will be leaving T-Mobile. There is no question, I will be looking for another carrier. … Continue reading
How to install DJB’s dnscache on Ubuntu 10.10
I recently attempted to install DJB’s dnscache from packages on Ubuntu 10.10. It seemed to be a bit broken and I wasn’t interested in installing from source. This is a quick set of steps to get it running.
Cybertage
To Sabotage by the Beastie Boys. Apologies all around. haha Inspiration: http://twitter.com/WeldPond/statuses/14499873948700673
Create a bootable usb stick from an ISO with OSX
It’s pretty easy to create a bootable usb stick with Snow Leopard. For example, I’m creating a bootable Ubuntu 10.10 server usb stick. Plug your usb stick in and use diskutil to list your disks: $ diskutil list
Wikileaks wack-a-mole, cyberwar first steps
I read that the Pentagon was looking into ways to take down Wikileaks, but ultimately decided to do nothing. There was talk of Cyber Command getting involved and this got me wondering if those in charge realize what they are … Continue reading
CarMax can’t fix my car, sends me to another dealership. FAIL
This is a letter I’ve mailed to CarMax Corporate Headquarters. To whom it may concern, I have purchase and sold four cars through CarMax. Up until recently I have been happy with my CarMax experience and have recommended them to … Continue reading