A Lesson in Cybersecurity: How a Simple Flaw in a Partner's Software Exposed Millions of McDonald's Job Applicants

A woman looking at a computer screen. McDonald's and Paradox.AI logos

A startling security vulnerability in a recruitment platform used by McDonald's has potentially exposed the personal data of up to 64 million job applicants. The incident serves as a powerful reminder of a risk that has plagued the technology sector for decades: the supply chain. I question whether McDonald's had even done a thorough cybersecurity due diligence when contracting with Paradox.

I also note, while the platform in question uses artificial intelligence, the critical error was deeply human and not a failure of AI at all.

Apple’s App Store Under Fire: Global Rulings Open the Door for Fintech Innovation and Raise New Cybersecurity Challenges

Apple app store, judge, fire

In a historic shift for the digital economy, Apple is being forced by courts and regulators in both the United States and Europe to allow app developers to use any payment method for their apps and in-app purchases-without Apple’s customary commission or fees. While these rulings are set to unleash a wave of fintech innovation and competition, they also introduce new cybersecurity risks that could impact millions of users worldwide. This article explores the legal battles, the global regulatory landscape, the opportunities for fintech, and the security challenges that lie ahead.

The End of Active Directory: Why Your Cybersecurity Strategy Demands Entra ID Now

Right, let's have a honest discussion about Microsoft Active Directory. For ages, it’s been the bedrock of how most businesses handle logins and access – the familiar, reliable workhorse humming away in the server room. It did its job, absolutely.

But here’s the rub: the world it was built for vanished years ago. Is it appropriate to keep clinging to legacy technology foundations as your main line of identity defence in today's world? Frankly, that’s looking increasingly like bringing a knife to a gunfight.

Burning Active Directory being thrown into a wastebin

Secure Your iPhone In 5 Simple Steps

front page of the article from the series "Learn with Vladimir Jirasek" showing iPhone screenshots with security features

Your iPhone houses your entire digital existence - from cherished photographs and private messages to sensitive banking information and beyond. Whilst Apple's iPhone with the latest iOS offers impressive built-in security, it's not simply a "set and forget" arrangement. To properly shield your digital life from criminals, I recommend taking several straightforward measures. None of these steps are intrusive and shouldn't hamper your user experience.

Updated on 2025-11-12 with new security feature of iOS26. As a result it is now a list of 6 recommendations. To ensure the link works, I have not changed the blog post title.

One chapter has closed - Skybox Security is no more

skybox security no more Yesterday, 24th February 2025, I received the heartbreaking news that one of the cybersecurity vendors I had worked with since 2006, Skybox Security, has closed its doors.

The announcement came as a shock, first shared with employees on a call and later communicated to channel partners via email. Skybox Security was once a visionary company, yet it has now faced an unfortunate end.

My thoughts are with all the former employees whose lives have been suddenly disrupted. I sincerely wish them strength and resilience in navigating this transition and finding new opportunities that match their talents and expertise.

Let’s take a moment to reflect on Skybox Security’s journey and the lessons to be learned.