John Childs
Miami-Fort Lauderdale Area
18K followers
500+ connections
View mutual connections with John
John can introduce you to 3 people at Securement
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with John
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
18K followers
-
John Childs reposted thisJohn Childs reposted thisAre companies overreacting about AI risk? In many cases, the real issue is lack of visibility. Organizations often believe they understand how AI tools are being used internally - until they actually look. And what they discover is that AI usage is often far more widespread than expected. 👀 FortressAI helps organizations gain the visibility and control needed to manage AI safely. Learn more: www.getfortress.ai #AISecurity #CyberSecurity #AIAdoption #DataProtection #FortressAI
-
John Childs reposted thisJohn Childs reposted thisWhere does control actually begin in a modern security stack? Most enterprise security architectures still follow a familiar sequence: activity is observed → telemetry is generated → signals are correlated → behavior is classified → an incident is declared → response begins This model is well understood. It is also increasingly downstream by design. By the time most security systems engage, the organization is already operating in interpretation mode—reconstructing context, validating signals, and coordinating response. Which raises a question I keep coming back to: Have we structurally accepted that security begins only after activity becomes observable? Cyber Crucible intervenes earlier in that chain. Instead of acting after telemetry is generated and classified, it operates at the point where activity is still being resolved in real time—before it becomes observable security data. Architecturally, this corresponds to a kernel-adjacent enforcement layer, but the operational relevance is more important than the terminology: -it prevents escalation before telemetry generation. That shifts the center of gravity away from detection and response, and toward a more uncomfortable question: -where does control actually begin in modern enterprise architecture? Because if most SOC and SIEM pipelines are optimized for what happens after classification, then the real constraint may no longer be detection capability—it may be the assumption that visibility is the first point of control. And I’m not sure that assumption holds anymore in modern environments. Curious how other security leaders are thinking about this: Where does control actually begin in your architecture—pre-telemetry, or post-telemetry? #CyberCrucible #ZeroTrust #EnterpriseSecurity #SOC #CyberDefense
-
John Childs reposted thisJohn Childs reposted thisRansomware has rapidly shifted from a rising concern to a critical issue at the executive level. So, how has it become one of the most significant cyber threats organisations face today? Join CyberWin UK on April 29th at 2pm BST for an engaging session featuring Forbes Technology Council member name1 and ransomware and cybersecurity expert name2. In this session, we’ll cover: • The evolution of ransomware into a major global threat • The real extent of its impact across different sectors • Practical recommendations for improving awareness training • Expert insights to help organisations build stronger cyber resilience If you want to deepen your understanding and improve your defences against modern ransomware threats, this is a session you won’t want to miss. Reserve your free spot below: https://lnkd.in/eCzd7HRi
-
John Childs reposted thisLast week, we hosted a webinar on AI coding tools. And the hottest questions from the audience weren’t about capabilities, they were about metrics and KPIs. How do you measure efficiency? Track ROI? Keep costs under control? The Uber case shows why it matters. With token-based tools like Claude Code, costs don’t scale linearly, they can spike fast. AI agents are powerful, but not “set and forget.” They need clear KPIs, usage boundaries, and planning. Otherwise, optimization can quickly turn into the opposite. It’s no longer about whether to adopt AI coding tools. It’s about how to control and scale them sustainably. Curious, how are you tracking AI costs and KPIs in your teams? 🤔John Childs reposted this💸 Uber has already burned through its entire 2026 AI budget just four months into the year, and Claude Code is the reason. Uber CTO Praveen Neppalli Naga confirmed the overrun, saying the company is "back to the drawing board" because the budget it expected to need has already been blown. The surge came from rapid adoption of Claude Code across engineering. Uber rolled out access to around 5,000 engineers in December 2025. By February, usage had nearly doubled. By March, 84% of developers were classified as agentic coding users. Today, about 70% of committed code comes from AI, and roughly 11% of live backend updates are written by AI agents. The cost problem comes from how Claude Code is priced. Instead of a flat per-seat rate, it runs on token consumption, which scales quickly when engineers run parallel agents and full-codebase refactors. Even with a $3.4 billion R&D budget, Uber underestimated how fast adoption would move. Companies are no longer deciding whether to use AI coding tools. They are discovering that once engineers start using them seriously, old software budgets no longer hold. What are your thoughts on this? 🤔💬 Want to keep up with AI? 🤖 Follow Evolving AI to stay ahead of your competition (trusted by +4 million followers online) ✉️ Join 100,000+ newsletter readers and stay updated on the latest AI insights: https://lnkd.in/em9B--mb
-
John Childs reposted thisJohn Childs reposted thisThe University of Florida is recognized again on the Forbes “New Ivies” list of public institutions — highlighting UF’s leadership in preparing students for an AI-driven workforce. ➡️ brnw.ch/NewIvy26
-
John Childs reposted thisJohn Childs reposted thisTraditional data breaches required hackers to manually search through stolen files. AI changes that. AI tools can instantly analyze thousands of documents, identify sensitive information, and summarize insights within seconds. That means the risk isn’t just data leaving your systems - it’s how quickly it can be understood and exploited once it does. ⚠️ Organizations need new ways to control how AI accesses company data. Learn more about protecting your organization’s AI usage: www.getfortress.ai #AISecurity #CyberRisk #DataProtection #AIThreats #FortressAI
-
John Childs reposted thisJohn Childs reposted thisLet's chew the fat for a minute, and talk about too much of a good thing. Speaking of chewing the fat, bacon fat makes for some great maple syrup glazes. The numbers are all over the place, with respect to: 1. How many employees admit they use AI in the workplace, and 2. How much of proprietary data they push up to AI. The numbers are bad if you are concerned about unmanaged data leaks by strange applications. Strange watery tarts throwing swords at people, letting people wield supreme executive power? Also bad. Possibly 95% of the files uploaded to AI contain proprietary data. Around half of the employees admit they use unauthorized AI tools. So, figure around 75%. Much like getting a company to admit to ransomware for statistics gathering (especially with The Fuzz calls), getting employees to answer truthfully for something they know they probably shouldn't admit to is a bit of a challenge. AI has some pretty cool uses. I love using it to take a 3000 word essay, and make executive summaries. I'm too suspicious to do the opposite; I'll have to find a college student to ask concerning effectiveness. Cyber Crucible, Inc. ran into a bit of an issue with alerting on violations of AI acceptable use. An alert or two from Sue in Accounting was the expected output. Not 1,000 alerts for an AI tool determined to upload and analyze all the data. So we had to do some quick refinement on alerts. That can be too much of a good thing. Well, depending on who is doing it, and what data. In this case, not a good thing. Improper AI tool usage blocked by the kernel, but far too many alerts. Somehow, cybersecurity vendors have trained us all that an endless stream of false positives are needed to demonstrate value. My theory is they all miss the days of pagers going off night and day. One alert of data access being blocked by an AI tool being used by a user or service account is enough. I was a huge pager fan before I could afford a cell phone. Until I got one for work. Now if you'll excuse me, I need to find more syrup for my poutine, and settle in for a long night of Knight Rider reruns. This (and other posts) live on in on my substack: https://lnkd.in/gP-5wMPw
-
John Childs reposted thisJohn Childs reposted thisThe network perimeter stopped being the main attack surface years ago. Today, identity is the new perimeter - powered by tokens, keys, and credentials that grant access to critical systems. When those identity assets are stolen, attackers don’t break in. They log in. 🎥 Watch Dennis Underwood explain why identity protection is now the front line of cybersecurity. #CyberSecurity #IdentitySecurity #ZeroTrust #ThreatPrevention #InfoSec
-
John Childs reposted thisJohn Childs reposted thisUnfortunately, Cyber Crucible, Inc. was impacted by this recent Microsoft event, and are waiting our turn to have this matter corrected. Like every news event, there are things that are accurate and things that could use some better communication. Microsoft did inform the hardware developer community that re-validation was coming. The notification was in a quite obscure blog, and the popup was only if you were logging in to submit drivers frequently. There are some understandably hurt feelings because many companies don't update their driver files frequently. Cyber Crucible did the re-validations in multiple times, as requested, since that October 2025 blog post. We can echo the frustration by the software vendors online now saying, "...but we did the things Microsoft asked, each time, promptly". Maybe the database wasn't being updated (see #1 below) Do you know what this really feels like, with no proof? 1. Someone ran a bad database update on the Microsoft approved Independent Software Vendor database, disabling a myriad of legitimate, active Independent Software Vendor accounts. Or the database was not being updated with the validations that were being done. Or deleted, who knows. Let's skip the old drivers for a second. 2. No IT or developer wants to volunteer the "oops". People have lost money. 3. The human-centric support channels had been moved to chatbots. (OK, this is true. The CoPilot support bot is worse than some 1990's Yahoo IM chatbots, and it didn't have access to the "right" support channel anyway.) 4. The hardware developer community is a bit of a sleepy part of our IT infrastructure dominated by very specific skills and needs. They are now completely overwhelmed with LOTS of people yelling about their supply chain now being interdicted. (made smaller by recent efforts for "AI" to replace bespoke development talent.) Or some other black swan event that someone like Mr. Krebs will research and report about in a few months. There are some related things we have seen in the past couple months that are not in the news. So if you happen to have a friend at Microsoft that can push us through the sea of vendors, we'd appreciate it. Also, to the folks that have helped us quietly get through this thus far, you all rock, I owe bottles of whiskey, and I hope to repay every favor before 2026 is up. There is a bigger argument about support mechanisms and business process optimization for dark corners of the technology world that the rest of us all rely on. Waiting for some EDR-flavor-of-the-week marketing saying, "19 out of 20 surveyed hackers agree security tools shouldn't use kernel drivers" in 3, 2, 1... https://lnkd.in/g49RamdPMicrosoft account verification fiasco halts critical OSR updates: tech giant scrambles to restore accessMicrosoft account verification fiasco halts critical OSR updates: tech giant scrambles to restore access
-
John Childs liked thisJohn Childs liked thisAre companies overreacting about AI risk? In many cases, the real issue is lack of visibility. Organizations often believe they understand how AI tools are being used internally - until they actually look. And what they discover is that AI usage is often far more widespread than expected. 👀 FortressAI helps organizations gain the visibility and control needed to manage AI safely. Learn more: www.getfortress.ai #AISecurity #CyberSecurity #AIAdoption #DataProtection #FortressAI
-
John Childs liked thisJohn Childs liked thisWhere does control actually begin in a modern security stack? Most enterprise security architectures still follow a familiar sequence: activity is observed → telemetry is generated → signals are correlated → behavior is classified → an incident is declared → response begins This model is well understood. It is also increasingly downstream by design. By the time most security systems engage, the organization is already operating in interpretation mode—reconstructing context, validating signals, and coordinating response. Which raises a question I keep coming back to: Have we structurally accepted that security begins only after activity becomes observable? Cyber Crucible intervenes earlier in that chain. Instead of acting after telemetry is generated and classified, it operates at the point where activity is still being resolved in real time—before it becomes observable security data. Architecturally, this corresponds to a kernel-adjacent enforcement layer, but the operational relevance is more important than the terminology: -it prevents escalation before telemetry generation. That shifts the center of gravity away from detection and response, and toward a more uncomfortable question: -where does control actually begin in modern enterprise architecture? Because if most SOC and SIEM pipelines are optimized for what happens after classification, then the real constraint may no longer be detection capability—it may be the assumption that visibility is the first point of control. And I’m not sure that assumption holds anymore in modern environments. Curious how other security leaders are thinking about this: Where does control actually begin in your architecture—pre-telemetry, or post-telemetry? #CyberCrucible #ZeroTrust #EnterpriseSecurity #SOC #CyberDefense
-
John Childs liked thisJohn Childs liked thisI have 18 certifications, and just short of a decade of digital forensics experience, and until recently I was pointing all of it at the wrong clients. Enterprise consulting has a particular rhythm. Long proposals, procurement cycles, contracts that take months to close. I was good at it. But, I stayed in it longer than I should have. The whole time, individuals were calling me with real, urgent problems. A parent who sent $30,000 before realizing the voice on the call was an AI clone of their child. A retiree whose savings were drained over six weeks by someone who had spent months studying their routines. A family trying to recover evidence after a scam, with no qualified practitioner to call. I kept declining. I told myself it was not the work I did. Eventually I had to stop lying to myself about that. The most serious forensics work in this country is not happening inside Fortune 500 companies. It is happening to individuals, families, and small businesses who have no qualified practitioner to call. I had been trained specifically for this for a decade. I had just been walking past it. I took the cases. I built the practice around the people this industry was designed to ignore. The lesson I keep coming back to: as entrepreneurs, we spend too much time trying to fit ourselves into business models that already exist. The real opportunity is usually in building the one that does not exist yet. If someone in your network has been told their situation is not serious enough, or not the right kind of problem, or not something a real firm handles, this is exactly the work I do now. Share this post. Cybercrime does not only happen to companies, and the people it happens to deserve qualified help.
-
John Childs liked thisJohn Childs liked thisWe don't have a ton of examples of our software being removed by clients. Whether it is a new manager going scorched earth on the existing tools, an M&A action, or something else, we have a bit of a trend... The ones that are later attacked have on average around 4 months from uninstallation before we see evidence of an infection either through the news, questions from a new IT provider, or attacks coming to us from the former customer. 48 hours is the shortest we've seen so far, around 9 months is the longest. There is a secondary statistic - If removal of the software takes longer, even if the software active defense component was disabled due to lapsed licensing, it is still around 4 months on average from software removal. Agent presence, not activation, seems to drive this timeline. I suspect attackers cannot tell if the software will stop them or not. I don't have enough examples to start comparing mean to median or anything like that. That would be cool to see, but I'd need a ton more customers to start generating that level of data. We have had a couple attackers activate right as we were mid-deployment of CC, which reminds me a bit of the attached meme. What should the caption be?
-
John Childs liked thisJohn Childs liked this📣 This is going to get attention… A new US ruling means AI chats could be used as legal evidence. No privilege. No guarantees. Just a record of everything typed into AI. That shifts AI from productivity tool → legal risk. Every prompt. Every input. Every “quick question.” Potentially discoverable. That’s exactly the problem Fortress AI is built to solve - controlling how sensitive data is used inside AI tools. Are organizations taking this seriously yet? #AI #CyberSecurity #DataSecurity #LegalRisk #InfoSec #FortressAI
-
John Childs liked thisJohn Childs liked thisAI is so much more than another wave of innovation or the latest buzzword. We see it as a new infrastructure layer reshaping how data moves across the enterprise. In our latest webinar, Concentric AI's Chief Scientist Dr. Madhu Shashanka and CISO Lane Sullivan break down: ✔ What makes GenAI fundamentally different from traditional AI/ML ✔ Where legacy DLP falls short and what replaces it ✔ How to accelerate AI adoption without increasing data risk (Lane joins Madhu partway through for a dialogue on the path forward.) If AI is already in your workflows (and it is), this is a conversation worth catching. Watch it on demand here: https://okt.to/jdcKJe
Experience
Education
Recommendations received
10 people have recommended John
Join now to viewView John’s full profile
-
See who you know in common
-
Get introduced
-
Contact John directly
Other similar profiles
Explore more posts
-
BleepingComputer
74K followers
⚠️ CISA is warning about active exploitation of a critical flaw in ConnectWise ScreenConnect. 🏛️ Federal agencies have until June 24 to patch or remove affected systems under CISA’s binding directive. ➡️ https://lnkd.in/gUvE2V4H #cybersecurity #CISA #vulnerability #ScreenConnect
160
-
On Call Compliance Solutions
478 followers
𝗘𝘃𝗲𝗿𝘆 𝗱𝗼𝗿𝗺𝗮𝗻𝘁 𝗮𝗰𝗰𝗼𝘂𝗻𝘁 𝗶𝘀 𝗮𝗻 𝘂𝗻𝗹𝗼𝗰𝗸𝗲𝗱 𝗱𝗼𝗼𝗿 CMMC 2.0 requires you to disable inactive identifiers—because old credentials are an easy target for attackers and a red flag for auditors. Best Practices: • Automate with Active Directory or Entra ID • Set inactivity limits (30–60 days) • Audit accounts quarterly • Document policies in your SSP Don’t let forgotten logins jeopardize your compliance 🎥Check out our video: https://cstu.io/90202d 📆Schedule time with experts: https://cstu.io/a0582e #CMMC #Compliance #InactiveAccounts
-
CloudCTRLS
27 followers
Attackers are hammering M365 logins again with lookalike sign-in pages. 3 fast wins today: • Turn on number-matching MFA, kill SMS. • Block legacy protocols (IMAP/POP) for everyone. • Require device compliance before Outlook/Teams. South Florida teams — if you need this locked down, cloudctrls.com #M365Security #Phishing #SMBsecurity #CloudCTRLS
-
DNS-Consulting
188 followers
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below - CVE-2025-11371 (CVSS score: 7.5) - A vulnerability in files or directories accessible to #cisa #adds #gladinet #flaws #catalog #amid #active #exploitation #evidence More: https://lnkd.in/gYUpcsCG
-
Virtual Service Operations
4K followers
CMMC consultant: "Here's your documentation. Good luck maintaining it." Then reality hits: Daily IT operations don't match documented processes Security tools generate alerts nobody investigates Configuration changes break compliance baselines Evidence collection falls to whoever has time VSO manages your IT operations AND your compliance posture. Because they're the same thing. #ManagedServices #CMMC #DefenseContractors
3
-
Black Hills Information Security
128K followers
**NEW** BHIS | Blog "As penetration testers, Nmap is a tool we use daily that is indispensable for verifying configurations and identifying potential vulnerabilities." Vulnerability Scanning with Nmap by: Terry Reece Published: 7/16/2025 Learn more: https://lnkd.in/eWD3DtwP
39
-
CyberCureME - Cyber Security Marketplace
9K followers
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is CVE-2025-58360 (CVSS score: 8.2), an unauthenticated XML External Entity (XXE) flaw that affects all versions prior to
-
Titanium
1K followers
Many companies keep buying security tools. Another firewall. Another endpoint platform. Another dashboard. More tools. More alerts. But attacks rarely break tools. They slip between them. SOC & SIEM connects the signals. Because security gaps do not exist inside tools. They exist between them. #CyberSecurity #BreachPrevention #ThreatDetection #SOC #SIEM #SecurityGaps
2
-
ABC News
214K followers
The DHS' Cybersecurity and Infrastructure Security Agency (CISA) has posted an alert saying it is aware of "active exploitation" of a new vulnerability to Microsoft SharePoint "enabling unauthorized access to on-premise SharePoint servers." Read more: https://lnkd.in/eqh6mBwb
26
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named John Childs
-
John Childs
San Antonio, TX -
John Childs
Denver Metropolitan Area -
John Childs
Vero Beach, FL -
John Childs
Greater Burlington Area
316 others named John Childs are on LinkedIn
See others named John Childs