"Reasonable" Security, the Evolving CISO role, Supply Chain Attacks, Widespread Memory-Unsafe Open Source Code and Threat Modeling LLM-powered Applications
Cyber for Board Directors, AI Red Teaming, WTF is CDR? Why the NVD is/was important and Beyond CVE's
SEC vs. Solarwinds, Microsoft Visits Congress and Whistleblower Comes Forward, Apple AI Privacy Cloud Compute, DoD's NIPRGPT and Out of Control CVE Growth
Dissecting Secure-by-Design
Securing the Digital Arsenal of Democracy
Open Source & GitHub Advisory Database
A look at behaviors and patterns that lead to Shadow usage of technologies and how security hinders itself, with AI as the latest example
Vulnerability Management Modernization & FedRAMP
Kubernetes, Runtime and Supply Chains
A look at the explosion of Non-Human Identities in the Digital Landscape and the role they play in modern attack surfaces
A look at the Federal and Defense communities grappling with the dichotomy between cybersecurity, innovation and compliance (FedRAMP, ATO's & Self-Attestations)
Cloud Threats and Cloud Security Platforms