Why I’m Releasing This Work Today | The Turkey, the Eagle, and the Hug Heard Around the World Thanksgiving is a day when people gather with friends and family, pile their plates with too much food, switch to sweatpants by 3 p.m., and lean into one of the most […]
What Happened with HunterStorm.com | Clarifying the Recent “Account Suspended” Notice
What Happened with the Hunter Storm Official Site | Clarifying the Recent “Account Suspended” Notice The notice was triggered by a billing error. Although HunterStorm.com is set up for automatic payment, a temporary processing issue caused the system to display the account as suspended. This article explains the Hunter […]
Crisis Leadership | Lessons from the Shadow CISO During the Wells Fargo Sales Practices Scandal
Leading Enterprise Security at the World’s Largest Financial Institution During the Largest Banking Scandal in History I didn’t apply for a crisis. In 2017, I was asked to “take over my new manager’s role so they could transition to a new one” and to “help out with some overdue […]
Strategic Edge and Unique Value
Strategic Edge and Unique Value Wondering what Hunter Storm can do for you and your organization? Learn more about her background and services below. What Is Hunter Storm’s Professional Technology Background? Technology Executive | Global Thought Leader | Keynote Speaker | CISO | Advisory Board Member | […]
StormWatch | Apple Plans to Scan U.S. Phones for Child Abuse Imagery
Tech for Good | Think of the Children by Hunter Storm, (originally published August 6, 2021 on LinkedIn) On August 5, 2021, Reuters released an article, Apple Plans to Scan U.S. Phones for Child Abuse Imagery. So, Apple plans to scan users’ devices for child porn. A laudable goal. […]
StormWatch | ChatGPT | Public Data Exposure
StormWatch Cybersecurity Advisory | Important Notice to ChatGPT Users | Unauthorized Chat Sharing and Public Exposure by Hunter Storm, Published 2025 August 3 ChatGPT Data Exposure | What Happened? Several users have discovered that some of their ChatGPT conversations were shared publicly without their consent. These shared chats: […]
Technology Is Critical Infrastructure | IaaS and TaaS
Technology Is Critical Infrastructure | IaaS and TaaS “We can no longer separate technology funding from infrastructure funding. In the days before technological integration into everyday infrastructure and supply chain, it made sense to separate those funding buckets. Today, however, all infrastructure Is completely reliant upon technology. Therefore, technology […]





