General
20 articles
Semperis' Mickey Bresman: The making of 'Midnight in the War Room'
Mickey Bresman discusses "Midnight in the War Room," a full length feature film on cyberwar and CISO heroism.
Illumio's Andrew Rubin: The lies we keep buying in cybersecurity
Andrew Rubin breaks down what must change to build real resilience.
Building the Cyber Risk Intelligence Layer: From AI Models to Actionable Security - Srinivas Tummalapenta - RSAC26 #5
SC Awards Finalist: Best Threat Detection Technology - Gurucul - Saryu Nayyar - SCA26 #1
Doppel's Bobby Ford on why legacy controls are failing
Doppel's Bobby Ford explains how AI-powered impersonation and deepfake-enabled campaigns are exposing critical gaps in legacy defenses.
Dutch court threatens xAI with fines over Grok's nonconsensual nude images
Grok — which is owned by Elon Musk’s xAI — will be forced to pay damages of €100,000 ($115,000) a day if it does not comply, according to the ruling.
SandboxAQ's Marc Manzano: The onus for AI security is on the enterprise
Responsibility for AI security has fallen squarely on enterprises, says SandboxAQ's Mark Manzano in this interview.
RSAC 2026 takes a sober look at the competing narratives around AI
Sure, AI presents many challenges, but our industry can prevail by sticking together and maintaining a culture of transparency.
From Risk Data to Business Decisions: Enabling Autonomous Cyber Risk Programs - Evelyn Anderson - RSAC26 #5
SC Awards Finalist: Best SME Security Solution - Stellar Cyber - Steve Garrison - SCA26 #1
SC Awards Finalist: Security Executive of the Year - Ankur Shah - SCA26 #1
Agentic GRC: Teams Get the Tech. The Mindset Shift Is What's Missing.
Agentic GRC automates workflows, forcing teams to rethink their role beyond operations. Anecdotes explains why the biggest challenge is shifting from executi...
SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's pre-publish scanning pipeline to cause the tool to allow a malicio...
Identity at RSAC 2026: Continuous, AI-ready and quantum-safe
Identity talks in San Francisco focused on new realities challenging traditional authentication schemes.
OpenAI Launches Bug Bounty Program for Abuse and Safety Risks
Through the new program, OpenAI will reward reports covering design or implementation issues leading to material harm. The post OpenAI Launches Bug Bounty Pr...
How we use Abstract Syntax Trees (ASTs) to turn Workflows code into visual diagrams
Workflows are now visualized via step diagrams in the dashboard. Here’s how we translate your TypeScript code into a visual representation of the workflow.
Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google
‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration
UK Cracks Down on Chinese Crypto Marketplace for Funding Southeast Asia Scam Hubs
The UK government has sanctioned Xinbi, described as “the second-largest illicit online marketplace ever”