Justice for Spyware Victims: Policy Pathway Forward

Rethink Resilience. Redefine Defense.

The event that connects IT & Security leaders to help navigate the everyday challenges of the modern threat landscape. Join us virtually on October 9th and hear directly from your peers - the ones who've faced the threats you're planning for and who are shaping what comes next.

🔎 Cyber Watch

Justice for Spyware Victims: Policy Pathway Forward

There is a proposal for a clear legal path for victims of commercial spyware—like Pegasus—to seek justice in U.S. courts. It highlights how courts currently dismiss these cases on procedural grounds, leaving victims without recourse. The article suggests amending the Computer Fraud and Abuse Act (CFAA) to specify U.S. venues for these cases and ensure victims can have their day in court.

Takeaway: Without legal reform, spyware victims will continue to face barriers to justice—even when fundamental rights are clearly violated—making clear venue guidance urgently needed.

🎙️ Tech Briefing On‑Air

Building Trusted Incident Response Ecosystems

In this Cybersecurity’s Golden Rule podcast episode, Joshua speaks with Chris Cronin, partner at Halock Security Labs and founding partner of Reasonable Risk. Their conversation explores how cybersecurity, risk management, and law intersect in defining what counts as “reasonable” safeguards. Chris explains the DoCRA Standard and CIS RAM, showing how legal and historical frameworks shape practical security strategies.

What It Means

  • Organizations must align cybersecurity with legal definitions of “reasonableness” to avoid gaps in compliance.

  • Risk assessments should be defensible in both regulatory and legal contexts.

  • The DoCRA Standard and CIS RAM provide practical frameworks for applying reasonable safeguards.

  • Automation is emerging as a way to make risk management both consistent and scalable.

🤝 Partner Intel

SuperOps RMM: Streamlined MSP Management

SuperOps, a Remote Monitoring and Management (RMM) platform, offers managed service providers (MSPs) a unified space for endpoint management, ticketing, reporting, and billing. With automation features and simple onboarding, it’s built to streamline workflows and boost profitability for small to mid-size MSPs.

🤖 AI Runtime

AI-Driven Simulations Elevate Cybersecurity Training

AI tools—including chatbots and simulation platforms—are gaining momentum for enhancing cybersecurity training and experimentation. These tools, when used in focused, narrowly defined scenarios, provide safer and more effective environments for learners to practice detecting and responding to cyber threats. While some solutions can be costly and less accessible, their real-world value lies in their ability to simulate complex threats—like phishing attacks or social engineering tactics—without risk. Used wisely, AI-powered simulations can significantly strengthen both individual skills and organizational resilience.

📊 By the Numbers

$97.4 million

In Operation Serengeti 2.0, INTERPOL and partner nations arrested 1,209 suspects across Africa and seized nearly $97.4 million from cybercrime operations involving inheritance scams, ransomware, and business email compromise, affecting around 88,000 victims.

🗳️ Your Tuesday Take

Cast your vote on our weekly poll.

Which legal reform should be prioritized to better support victims of cyberattacks?

Login or Subscribe to participate in polls.

📩 We’ll share the results in the next issue.

🔗 Stay Connected

Until Thursday’s edition - Let’s keep that zero-day count at zero!