Newsroom

Media coverage and expert commentary on cybersecurity, identity security, and emerging threats

Vincenzo Iozzo provides expert analysis on cybersecurity incidents, identity-based attacks, and security best practices to leading industry publications.

March 2026 Dark Reading

Why Stryker's Outage Is a Disaster Recovery Wake-Up Call

Following the Iran-linked cyberattack on medical technology giant Stryker, Vincenzo Iozzo explains why organizations must frequently back up cloud environments and adopt Infrastructure as Code (IaC) practices for faster recovery. Iozzo emphasizes that segregation of privileges is paramount, with global admin privileges restricted to a handful of "break-glass" accounts to prevent catastrophic system wipes.

Disaster Recovery Cloud Security Infrastructure as Code Privilege Management
March 2026 Information Security Buzz

Iranian Hacktivists Claim Attack on US Stryker

In the wake of the pro-Palestinian hacktivist group Handala's destructive attack on Stryker Corporation, Vincenzo Iozzo provides expert analysis on the evolving threat landscape from nation-state and hacktivist groups. The attack, which wiped over 200,000 devices, demonstrates the critical need for robust identity security controls and disaster recovery strategies.

Nation-State Threats Hacktivism Critical Infrastructure Identity Security
2026 CSO Online

Overly Permissive Guest Settings Put Salesforce Customers at Risk

Vincenzo Iozzo warns that "Salesforce instances often contain highly sensitive customer data, including credentials and secrets that can be used for lateral movement." The article examines how threat actors exploit overly permissive guest user settings in Experience Cloud environments to harvest data using modified versions of tools like Aura Inspector, highlighting critical identity and access management vulnerabilities.

Salesforce Security Identity & Access Management SaaS Security Data Exposure
2025 MBT Magazine

AI-Generated Phishing Attacks Increase by 14x

Vincenzo Iozzo explains how AI adoption is compressing the response window for defenders: "Breakout times are steadily decreasing, in large part because of AI-assisted offensive operations." Iozzo emphasizes that phishing defenses must shift toward behavioral signals and delivery infrastructure analysis rather than relying on linguistic patterns, as AI eliminates the grammatical errors that previously flagged malicious messages.

AI-Powered Attacks Phishing Identity Threats Behavioral Detection

Media Inquiries

For expert commentary on cybersecurity, identity security, and emerging threats, contact Vincenzo Iozzo via LinkedIn.