Blog
Cyber Threat Report
CASE STUDY

Since the U.S. Department of Defense labeled Anthropic, the maker of Claude AI, a “supply chain risk,” the current administration has blacklisted Anthropic across all federal agencies after a disagreement about how the military can use the Claude platform. Anthropic refused to remove certain safeguards that block mass surveillance of Americans or powering fully autonomous weapons which resulted in the Pentagon putting Anthropic on a blacklist for all future defense work. Meanwhile, Claude became the top app on Apple’s U.S. App Store, even as the federal government ban took hold.

Recent industry reports indicate that, although global ransomware activity decreased slightly toward the end of 2025, the overall risk to organizations has not substantially declined. Attackers used the breathing room created by stronger backups and incident response capabilities to refine their operations, focusing on stealth, precision, and higher leverage over fewer but more lucrative victims. 

Cyber risk isn’t just an IT problem; it’s something every leader needs to take seriously. These days, regulators, customers, and insurers all want to see a clear, consistent plan for managing cyber security risks, not just a bunch of tools or one-off fixes. For CISOs, CIOs, compliance leaders, and IT directors, the question is no longer if to invest, but how to govern that investment through a disciplined framework.

Celebrate Data Privacy Week 2026 with JANUS Associates. Strengthen cybersecurity, reduce breach risk, and build a resilient data protection and privacy program.

Cybersecurity in 2025 moved decisively from “advanced persistent threat” to “always-on, AI-enabled risk,” especially for regulated, security‑sensitive sectors. Executives planning for 2026 should treat cyber as an integrated business risk discipline, not a series of point technology decisions.

The holidays are a time to slow down, reconnect, and recharge, but cyber threats don't take time off. While many teams are on vacation or operating with reduced staff, attackers see opportunity in distracted users, rushed processes, and unattended systems.