<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity on Ben's Info Tech Blog</title><link>https://infotechwithben.com/tags/cybersecurity/</link><description>Recent content in Cybersecurity on Ben's Info Tech Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 08 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://infotechwithben.com/tags/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>Claude Mythos: An Updated Review — From Leaked Draft to Project Glasswing</title><link>https://infotechwithben.com/posts/claude-mythos-updated-review/</link><pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/claude-mythos-updated-review/</guid><description>Claude Mythos: An Updated Review — From Leaked Draft to Project Glasswing April 8, 2026
Abstract Ten days after Anthropic accidentally exposed its next-generation AI model through a CMS misconfiguration, the company formalized what the leak revealed: on April 7, 2026, Anthropic officially announced Claude Mythos Preview and launched Project Glasswing, a cybersecurity initiative giving 40 carefully vetted organizations exclusive access to the model. This review synthesizes all information available as of April 8, 2026 — integrating the original March 26 leak findings with the confirmed benchmark data, partner details, pricing, and safety assessment released at official launch.</description></item><item><title>Post-Quantum Cryptography: The Race Before Q-Day</title><link>https://infotechwithben.com/posts/post-quantum-cryptography-the-race-before-q-day/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/post-quantum-cryptography-the-race-before-q-day/</guid><description>Post-Quantum Cryptography: The Race Before Q-Day The threat that keeps cryptographers awake isn&amp;rsquo;t a breach happening today. It&amp;rsquo;s the data that was stolen last year — sitting in an adversary&amp;rsquo;s archive, waiting for a quantum computer that doesn&amp;rsquo;t exist yet. By the time that computer arrives, the window to do anything about it will have already closed.
Why This Problem Is Different Most security threats are reactive — an attacker exploits a vulnerability, a defender patches it.</description></item><item><title>Shadow AI: The New Shadow IT</title><link>https://infotechwithben.com/posts/shadow-ai-the-new-shadow-it/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/shadow-ai-the-new-shadow-it/</guid><description>Shadow AI: The New Shadow IT Shadow AI is what happens when the productivity pull of generative AI outruns the governance infrastructure of organizations trying to contain it. It is Shadow IT with a faster clock speed, a bigger blast radius, and a compliance liability your legal team hasn&amp;rsquo;t fully priced in yet.
The Pattern We&amp;rsquo;ve Seen Before Security teams have spent the better part of two decades chasing Shadow IT — the proliferation of unsanctioned applications, services, and devices that employees adopt because approved tools are too slow, too clunky, or simply don&amp;rsquo;t exist yet.</description></item><item><title>How AI Has Impacted the Modern Phishing Landscape</title><link>https://infotechwithben.com/posts/ai-phishing-landscape/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/ai-phishing-landscape/</guid><description>Since November 2022—when ChatGPT launched—phishing has transformed from a labor-intensive attack vector into an industrialized threat operating at unprecedented scale. The statistics are staggering: researchers report a 1,265% to 4,151% increase in phishing emails since ChatGPT&amp;rsquo;s release, with AI-generated campaigns achieving a 54% click-through rate compared to just 12% for traditional attacks. What once took a skilled attacker 16 hours to craft now takes an AI system five minutes. The phishing landscape hasn&amp;rsquo;t merely evolved; it has been fundamentally restructured by artificial intelligence.</description></item><item><title>CMMC Compliant SSP Guide for Small Businesses</title><link>https://infotechwithben.com/posts/cmmc-compliant-ssp-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/cmmc-compliant-ssp-guide/</guid><description>A practical guide to understanding CMMC compliance and building a System Security Plan with limited IT staff and budget.
Why CMMC Matters for Small Business What is CMMC? Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense&amp;rsquo;s way of verifying that contractors protecting sensitive defense information have their security house in order. It&amp;rsquo;s not optional if you work with the DoD—it&amp;rsquo;s a requirement.
If your small business:
Sells to the Department of Defense Works as a subcontractor on DoD projects Handles Controlled Unclassified Information (CUI) Competes for federal contracts over $150,000 &amp;hellip;you need CMMC compliance.</description></item></channel></rss>