SC Media
20 articles
SC Awards Winner: Best CTEM Solution - Reach Security - Garrett Hamilton - SCA26 #1
Identity at RSAC 2026: Continuous, AI-ready and quantum-safe
Identity talks in San Francisco focused on new realities challenging traditional authentication schemes.
DropZone AI's Edward Wu on autonomous AI analysts at machine speed
Edward Wu explains how agent collaboration, deep recursive investigations, and self-agency expand SOC capacity by 10x without additional headcount.
Filigran's Samuel Hassine on a framework for high-impact cyber threat intelligence
Samuel Hassine explores how unifying threat intelligence with adversarial attack simulation enables a CTEM framework that replaces hype with measurable outco...
RSAC 2026: We're entering the age of 'integrous' systems
In an AI-driven world, says Bruce Schneier, guaranteeing the integrity of data is more important than ever.
RSAC 2026 Recap: Agentic AI Hype, Cybersecurity Trends & Startup Reality Check - RSAC26 #4
ThreatLocker's Rob Allen on the future of zero trust security
Rob Allen explores the shift toward device-based access enforcement.
Beyond the Hype: Measuring Cyber Readiness in the Age of AI - Gibb Witham - RSAC26 #4
Scanning The Internet with Linux Tools - PSW #919
OWASP Gen AI Security Project RSAC 2026 - Scott Clinton - RSAC26 #6
ArmorCode: AI Exposure Management and Governing Shadow AI - Mark Lambert - RSAC26 #4
Browser in the AI Era: Apply Controls Where the Work Happens - Arunesh Chandra - RSAC26 #4
Fenix24's John Anthony Smith on why more technology hasn’t made us more secure
John Anthony Smith argues that complexity, human decision‑making, and gaps in execution are what truly empower attackers.
Attack Surface Just Got a Copilot - Rob Juncker - RSAC26 #4
Securing the Next Billion Users: Why the Browser is the Front Line for Agentic AI - Ramin Farassat - RSAC26 #4
Intruder's Chris Wallis on confidence, AI and the future of exposure management
Chris Wallis explores whether AI can bridge the divide between finding vulnerabilities and understanding real-world attack context as exploit windows continu...
BPFdoor hides deep inside the OS kernel to target telecoms worldwide
China-linked Linux backdoor first spotted in 2021, but now runs inside the kernel of core telecom servers and Kubernetes pods.
The Making of Midnight in the War Room - Mickey Bresman - RSAC26 #4
Apiiro's Idan Plotnik on how AI-driven development and the risk landscape
Idan Plotnik discusses how AI-driven development is reshaping the application risk landscape.