Michael Hamilton on The Cybersecurity Defenders Podcast

Chris Luft and Mike Hamilton Discuss PISCES and public infrastructure protection on the Cybersecurity Defenders Podcast

(This podcast was originally recorded by The Cybersecurity Defenders Podcast)

April 8, 2026

Michael Hamilton on Talk the TAUC Podcast

Kirk Westwood and Mike Hamilton Discuss why construction companies are "low-hanging fruit" for cybercriminals.

(This podcast was originally recorded the Talk the TAUC Podcast)

February 24, 2026

Michael Hamilton and JL Peck

John-Luke Peck and Mike Hamilton Discuss PISCES on the Premiere Episode for PNWCC Podcast

(This podcast was originally recorded by PNW Cyber Collective)

August 25, 2025

Russian hackers hijacked a Norwegian dam, opened literal and metaphorical floodgates

Russian hackers hijacked a Norwegian dam, opened literal and metaphorical floodgates

(This article was originally published on machine.news)

August 14, 2025

Russia-linked threat actors allegedly seized control of a Norwegian hydroelectric dam and caused a torrent of water to gush out unnoticed for several hours.

That’s the claim from Norwegian Police Security Service (PST), which took the extraordinary step of attributing the cyberattack to Moscow.

In April, unidentified hackers opened up the floodgates and unleashed 500 litres (132 gallons) of water every second for four hours – the equivalent of about three Olympic swimming pools.

Beate Gangås, the head of PST, said: “Over the past year, we have seen a change in activity from pro-Russian cyber actors.

“The aim of this type of operation is to influence and to cause fear and chaos among the general population. Our Russian neighbour has become more dangerous.”

The Russian embassy in Oslo slammed the claims as “unfounded and politically motivated”.

It told Reuters: “It is obvious that the PST is unsuccessfully trying to substantiate the mythical threat of Russian sabotage against Norwegian infrastructure this year, which it itself invented.”

Continue reading on machine.news

State of Hawaii Office of Homeland Security and PISCES

University of Hawai'i and PISCES International Team to Help Secure the Future Workforce of Cybersecurity

Written by: Michael Hamilton

August 5, 2025

PISCES’ latest expansion state is Hawai’i. We’re partnering with the State of Hawaii, Cyber Hawai’i, and University of Hawai’i to bring cyber monitoring to local governments, public utilities, and rural healthcare in the Aloha State. With the University of Hawai’i as our lead school, we’re looking to get the Analyst curriculum, SOC Operations class, and Operational Technology Monitoring classes pushed into community colleges around the state.

Hawai’i is a key military installation for the United States, and the lack of a cyber qualified work force there is a problem we intend to help solve. Hawai’i will use the state and local cybersecurity grant program to fund PISCES deployment across the state, as part of its all-of-state cybersecurity strategy and efforts to address the executive order of March 18, 2025: “Enhancing Efficiency Through State and Local Preparedness”.

Bridging the Cybersecurity Gap Among America’s Underfunded Healthcare Providers

Bridging the Cybersecurity Gap Among America's Underfunded Healthcare Providers

(This article was originally published on NEXUS)

June 24, 2025

Rural healthcare providers across the United States face an increasing cybersecurity crisis as they struggle with limited funding, shortages in cybersecurity and IT expertise, and unending threats from savvy and better-funded adversaries. With a significant source of revenue from Medicare reimbursements, these healthcare delivery organizations, operating on tenuous margins, find themselves at a particularly precarious disadvantage as they defend themselves against cyber criminals.

“Rural hospitals operate on such thin margins that cybersecurity controls are often the last thing they’re thinking about,” Mike Hamilton, field CISO at Lumifi Cyber said. “When you’re worried about keeping the doors open, investing in security infrastructure becomes a secondary concern,” Hamilton said. The margins also make it tough for these providers to find and keep cybersecurity talent. This talent gap leaves many facilities with outdated security practices and vulnerable systems.

Continue reading on nexusconnect.io