Role of AI in Vulnerability Risk Prioritization Security In a messy age of cyber-attacks and multiplying vulnerabilities, IT… rooter June 12, 2025 1 min read 0
CISO Spotlight: Rick Bohm on Building Bridges, Taming AI, and the Future of API Security Security Nestled in a log cabin high in the Rocky Mountains,… rooter June 12, 2025 7 min read 0
Securing Cloud Access with Identity Controls That Actually Work Security Cloud breaches increasingly originate from compromised identities, whether through misconfigured… rooter June 10, 2025 1 min read 0
New Way to Track Covertly Android Users Security Researchers have discovered a new way to covertly track Android… rooter June 9, 2025 2 min read 0
Weekly Update 455 Security Presently sponsored by: Malwarebytes Browser Guard blocks phishing, ads, scams,… rooter June 9, 2025 2 min read 0
What is Exposure Management? Security Every organization today depends on a wide range of digital… rooter June 9, 2025 1 min read 0
Addressing the Gap in Cloud Security Skills & Training for Developers Security Rapid cloud adoption has transformed application delivery and infrastructure management.… rooter June 9, 2025 1 min read 0
Friday Squid Blogging: Squid Run in Southern New England Security Southern New England is having the best squid run in… rooter June 6, 2025 1 min read 0
Hearing on the Federal Government and AI Security On Thursday I testified before the House Committee on Oversight… rooter June 6, 2025 1 min read 0
Report on the Malicious Uses of AI Security OpenAI just published its annual report on malicious uses of… rooter June 6, 2025 2 min read 0