Bg ShapeBg Shape

Expert insights from

Robert Kehoe

Chief Technology Officer
Robert is CTO at Smarttech247, leading engineering strategy and delivery across cybersecurity products and services. With over 15 years’ experience in software and security, and CISSP certified, he has led large-scale cloud and security initiatives, including Cloud Protection for Salesforce. Robert focuses on measurable customer outcomes and building empowered, high-performing engineering teams.

Recent articles by this author

Featured Webinars

The Impact of AI Security Culture and Insider Threats Webinar

Webinar on AI’s impact on cybersecurity, insider threats, phishing, deepfakes, and building a positive security culture with tailored user coaching.

AI in Financial Services Fraud Detection Regulation and SOC Impact Webinar

Smarttech247 experts discuss AI in financial services covering fraud detection EU AI Act compliance SOC impact governance risks and human oversight.

AI in Cybersecurity for Retail Webinar

Discover how AI strengthens cybersecurity in retail, protecting customers and supply chains while improving detection and compliance.

AI in Cybersecurity for Aviation Webinar

Learn how AI enhances cybersecurity in aviation, protecting passenger data, improving threat detection, and supporting regulatory compliance.

AI in Cybersecurity for Agriculture and Food Webinar

See how AI supports cybersecurity in agriculture and food, protecting production systems, improving efficiency, and meeting compliance demands.

AI in Cybersecurity for Healthcare and Pharma Webinar

Learn how AI supports cybersecurity in healthcare and pharma, helping protect patient data, improve efficiency, and meet regulatory compliance.

DORA identity security requirements for financial services

Smarttech247 and SecureEnvoy discuss DORA, identity-focused threats in financial services and operational resilience requirements

Cyber Resilience Act Compliance Webinar

A short LinkedIn Live on the Cyber Resilience Act, covering product security, vulnerability reduction, and protecting customers under new CRA requirements.

Featured Writing and Reports

Risk Radar 08 May 2026

Palo Alto Firewall Exposure, Canvas LMS Breach, and Linux Kernel Privilege Escalation

Palo Alto firewall RCE, Canvas LMS data breach affecting 275 million users, and a nine-year Linux kernel privilege escalation bug.

LiteLLM Vulnerability, Scattered Spider Update, and the Vimeo Breach

This week: a critical LiteLLM AI gateway flaw exposes API keys, Scattered Spider faces legal action, and Vimeo's analytics breach highlights third-party risk.

North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

An in-depth look at major cybersecurity threats including North Korean supply chain compromises, a critical Chrome zero-day exploit, and Qilin ransomware

Axios Backdoor Exposes Supply Chain Risk at Scale

A backdoored Axios package, Citrix SAML flaw, and Lloyds data leak show how easily access is gained when trust, identity, and testing fall short.

MFA Bypass Attacks Rise as New Threats Emerge

A new MFA bypass phishing platform targets Microsoft accounts, alongside rising geopolitical cyber activity and critical Magento vulnerabilities.

Credential Abuse and Exposure Drive Enterprise Risk

Admin credential breach, SharePoint exploit in the wild, and iOS vulnerability highlight rising risks across identity, patching, and endpoints.

Iranian Cyber Attacks, Patch Tuesday & UK Cyber Bill

Increase in Iranian-backed cyber attacks, Microsoft Patch Tuesday zero-days, and updates to the UK Cyber Security and Resilience Bill impacting organisations.

Hacktivist Attacks Surge, Ransomware Trends and CISCO Flaws

Hacktivist attacks linked to Middle East tensions, rising ransomware activity, and new Cisco SD-WAN vulnerabilities highlight growing cyber risks for CISOs.

Critical Flaws in Dell, Chrome and Copilot

Critical Dell and Chrome vulnerabilities plus a Copilot DLP bypass highlight why patch speed, vendor risk, and AI controls demand urgent attention.

Third-Party Risk, Ransomware Disruption and AI Abuse

BridgePay outage exposes vendor dependency risk, Conduent breach impact widens, and AI is weaponised to scale phishing and malware campaigns.

Why Supply Chain Attacks, Exploits, and Insider Access Keep Leading to Breaches

Supply chain attacks, active Microsoft Office exploits, and insider access continue to cause breaches. Learn what security teams should prioritise to reduce ris

Fortinet and Microsoft Critical Patches, ShinyHunters Targeted Intrusion, and France’s Digital Sovereignty Shift

This week’s review covers critical Fortinet and Microsoft patches, a targeted ShinyHunters attack, and France’s shift toward digital sovereignty.

EU Cybersecurity Act Changes, Pwn2Own Zero Days, and Retail Ransomware Pressure

Updates on the EU Cybersecurity Act, zero-day discovery at Pwn2Own, and ongoing retail breach and ransomware activity.

Rising Incident Impact and Shifting Attack Patterns

Cybersecurity Week in Review covering NCSC incident trends, shifting attack patterns, supply chain risk, and a critical HPE vulnerability flagged by CISA.

Google Chrome Vulnerabilities, Cisco Advisories, OpenAI Phishing, and AI-Driven Attacks

Early 2026 cybersecurity analysis covering Google Chrome vulnerabilities, Cisco advisories, OpenAI phishing campaigns, and the rise of AI-driven cyber attacks.