Latest
Cybersecurity's Talent Paradox: Why So Many Open Jobs Likely Coexist with Career Chaos
The field desperately needs people, but neither employers nor job seekers seem yet to fully align on what skills those people should possess in an AI-dominated future.
Modern Security Posture Management: Solving the Hardest Problems with Cloud and APIs
Security Posture Management (SPM) is transforming how organizations secure data, infrastructure, and applications. Learn how cloud and APIs have evolved from security risks into modern SPM enablers.
Top 10 Cybersecurity-Related Jobs with the Highest Projected Demand
We've examined the available cybersecurity job demand data and projected job growth based on our synthesis of authoritative sources.
Penguins & Securing Agentic AI Before It’s Too Late
The problem is that most security models weren’t designed with agent autonomy in mind.
HOU.SEC.CON.: Cyberwarfare Likely a Decisive Element in Potential Taiwan Conflict
In a potential hot conflict over Taiwan sovereignty, cyber operations would be at the forefront, and aimed at slowing the U.S. military response, targeting military logistics systems, cloud-based sustainment platforms, naval communications, and intelligence, surveillance, and reconnaissance systems.
Cloud Security Alliance’s SSCF Framework Hopes to Set a SaaS Security Baseline
The SaaS Security Capability Framework, released by the CSA's SaaS Working Group provides an industry-standard set of baselines, customer-facing security controls for SaaS platforms.
How NIST's AI Control Overlays Interface with the Coalition for Secure AI
The National Institute of Standards and Technology's new Control Overlays for Securing AI Systems and the Coalition for Secure AI provide much-needed standardization for AI security across government and industry.
The Salesloft Drift Breach Expose Critical Flaws in OAuth Implementations
For enterprise security teams already struggling with SaaS sprawl and third-party risk management, the Drift breach is a reminder that OAuth tokens—designed to enhance security by eliminating password sharing—are high-value targets.