Addressing the Gap in Cloud Security Skills & Training for Developers
Rapid cloud adoption has transformed application delivery and infrastructure management. Despite efficiency gains, organizations face mounting cloud security challenges as […]
Rapid cloud adoption has transformed application delivery and infrastructure management. Despite efficiency gains, organizations face mounting cloud security challenges as […]
Southern New England is having the best squid run in years. As usual, you can also use this squid post
On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “The Federal Government
OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our
Legislation, Regulations, Challenges According to SABRIC (South African Banking Risk Information Centre), South Africa now rates as the third highest
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
According to the Wallarm Q1 2025 ThreatStats report, 70% of all application attacks target APIs. The industry can no longer
Google has recently released an out-of-band security patch to address a high-severity zero-day vulnerability in its Chrome browser. This vulnerability,
You can read the details of Operation Spiderweb elsewhere. What interests me are the implications for future warfare: If the
Do you have online accounts you haven’t used in years? If so, a bit of digital spring cleaning might be