Protecting our clients' data & best interests since 1988.
As we close out 2025, the cybersecurity landscape continues to evolve rapidly—with new regulatory guidance, intensified phishing threats, and an increasing convergence between IT and operational technology (OT). Below is our bi-weekly summary of key developments impacting cybersecurity leaders, risk professionals, and compliance officers across industries.
AI Guidance Strengthens Critical Infrastructure Resilience
New federal cybersecurity guidance emphasizes responsible integration of AI within critical infrastructure environments. This framework clarifies operational standards, encourages human-machine collaboration, and reinforces resilience through shared intelligence. Read More
DocuSign Phishing Emerges as 2025’s Top Inbox Threat
DocuSign-based phishing campaigns have become the most exploited impersonation vector in enterprise email systems, accounting for 13.8% of attacks bypassing security filters. Organizations should reinforce training on document verification and implement advanced phishing defense controls. Read More
U.S. Justice Department Pursues Russian-Backed Hacker
The U.S. has charged Victoria Dubranova for alleged participation in Russian-state cyberattacks targeting water systems and food supply chains — a reminder of escalating geopolitical cyber risks. Read More
CISOs Prefer Hybrid Security Environments
A new survey reveals enterprise CISOs increasingly view hybrid IT-OT environments as the optimal approach for managing risk, compliance, and business continuity. Unified strategies bridging cloud and on-premise assets are becoming essential. Read More
MITRE's 2025 Top 25 Software Vulnerabilities
MITRE released its annual list of the most critical software weaknesses. Cross-site scripting (XSS), SQL injection, and CSRF dominate the top three, while access control and buffer overflow errors remain persistent risks. Read More
Cybersecurity Becomes Core Business Strategy
Boardrooms are reframing cybersecurity as a strategic business priority, integrating it into operations, market planning, and geopolitical risk oversight. Read More
Post-Breach “Cyber Tax” Hits SMBs
A new study found that two-fifths of U.S. small businesses increased prices after a data breach. The financial and reputational costs of weak cyber hygiene continue to cascade through the economy. Read More
Pro-Russia Hacktivists Target U.S. Critical Systems
Researchers observed pro-Russia groups exploiting vulnerable VNC connections to compromise OT systems. These incidents highlight the urgent need for secure remote access configurations. Read More
Home Depot’s Extended System Exposure
An internal authentication token reportedly remained exposed for over a year before being revoked — underscoring the value of proactive vulnerability management and vendor accountability. Read More
U.S. Lawsuit Challenges Cloud Compliance Claims
A former Accenture manager faces federal charges over alleged misrepresentations of FedRAMP and DoD compliance in Army cloud systems, reaffirming the critical importance of regulatory transparency in cloud adoption. Read More
Exposed 16TB Database Revealed
Security researchers uncovered an unsecured 16TB database containing over 4.3 billion professional records, which remained open until reported. Misconfigured cloud databases remain one of the top causes of large-scale exposure. Read More
These developments mark a critical inflection point: organizations must pivot from reactive cybersecurity to proactive risk governance frameworks aligned with NIST, ISO 27001, and CIS Controls. As AI reshapes attack surfaces and compliance expectations intensify, integrated defense and audit readiness will define operational resilience.
Janus Associates helps organizations strengthen cybersecurity resilience, achieve regulatory compliance, and navigate complex IT risk challenges with confidence.