• Forging Trust
  • Posts
  • Are Boards Failing Cyber Governance? + Robots vs. Physical Security

Are Boards Failing Cyber Governance? + Robots vs. Physical Security

IT channel and business news with a focus on regulatory compliance.

⛓️‍💥 When 3,322 Breaches Is “Normal”

In 2025, the United States set a new record: 3,322 reported data compromises in a single year. That is not a typo, and it is not an outlier — it is the third year in a row with more than 3,000 incidents and a 79% increase in breaches over the past five years. For all the investment poured into “best‑practice” controls, cyber‑insurance, and compliance programs, the curve is not bending. At this point, we should stop treating the breach statistics as a technology problem and start reading them as a governance scorecard — and a failing one…

🤖 What Hybrid Robots Mean for Physical Security

A decade ago, the idea of a robot that could both bounce like an insect and fly like a drone belonged squarely in science fiction. Today, it’s a working prototype — and a preview of the next problem your physical security program is not ready for…

⚠️ Threat Updates

🔴 “Agentic AI” Joins Q1 Threat Stack as Attackers Automate Recon and Exploitation Against U.S. Public Sector (04/08/26)

Fresh research on Q1 2026 activity against U.S. public‑sector networks warns that “agentic AI” is emerging in real‑world attack chains, with adversaries experimenting on cloud‑hosted models to automate reconnaissance, vulnerability discovery, and lateral‑movement planning at machine speed. According to a TrendAI survey, 93% of security leaders expect to face daily AI attacks. » More Info

🔴 TeamPCP Expands Multi‑Ecosystem Supply‑Chain Intrusions Across Dev Tooling (03/29–30/26)

Ongoing reporting shows threat group TeamPCP methodically compromising multiple open‑source security and developer tools — including the Trivy and KICS vulnerability scanners, the LiteLLM AI gateway, and the Telnyx Python SDK — by abusing stolen maintainer and CI credentials to ship credential‑stealing updates into trusted package ecosystems. By targeting the very components embedded in DevSecOps pipelines, the group is turning automated dependency updates into a propagation vector, enabling large‑scale theft of cloud keys, GitHub tokens, and environment secrets from countless build agents and developer machines. » More Info

🗨️ Parting Words

“The empty vessel makes the loudest sound.” — William Shakespeare

Find the Blacksmith Team…

on demand with 
Get NIST-y on Spotify!

Are you a vCISO or MSP looking to operationalize security programs? Let’s discuss how Blacksmith Infosec proves that compliance is an opportunity, not a struggle that has to be packaged in FUD!