May
22,
2026
Re-think Security: Agentic AI, Prompt Injection, Observability, and Trust Boundaries Change Security Architecture and AIOps
Social engineering used to target people. AI changes that. Once LLMs start reading logs, interpreting telemetry, triggering workflows, and communicating with other systems, enterprise platforms themselves become vulnerable to manipulation through nothing more than language and context.
May
19,
2026
Threat Modeling for Infrastructure as Code
Infrastructure as Code (IaC) frameworks are powerful tools, but they come with their own security risks. Misconfigurations, insecure defaults, or insufficient access controls can be exploited by attackers. Threat modeling helps identify weaknesses early and creates transparency around potential attack vectors before critical flaws ever reach production. This article introduces...
May
6,
2026
Balancing Security and Agility with a Chief Trust Officer
As digital transformation takes shape, we’re all hearing about the accelerating pace of change. But through it all, one thing that hasn’t changed is the need for trust in our transactions and relationships. Trust is fundamental to every interaction, and it has become increasingly critical in a complex, dynamic world....
Apr
9,
2026
The Dark Side of npm: Detecting and Mitigating Supply Chain Attacks
In 2022 alone, npm saw multiple high-profile breaches, from cryptominers hidden in ua-parser-js to the deliberate sabotage of colors.js. With over 2 million packages and minimal publishing oversight, npm has become both the backbone of modern JavaScript development and a prime target for attackers. From typosquatting to dependency hijacking, malicious...
Mar
31,
2026
Modernizing Threat Modeling: Embracing Zero Trust for Cloud-Native Securit
This article explores how adopting a Zero Trust security model can modernize threat modeling, enabling continuous verification, least-privilege access, and proactive defense across dynamic systems. By integrating Zero Trust principles into DevSecOps and CI/CD pipelines, organizations can build adaptive threat models that strengthen cloud security, risk management, and resilience.
Mar
18,
2026
The Invisible Danger: Application Security Gaps
Modern cyberattacks exploit weaknesses and take advantage of hidden application security gaps in cloud and SaaS environments. This article explains what an application security gap is, why traditional IT and cloud security models often fail to catch it, and how real-world incidents show the massive business impact of overlooked vulnerabilities....
Mar
2,
2026
How Static Scanning is Eroding “Shift Left”
“Shift Left” has been the reigning philosophy in AppSec for the last few years. Yet what was once considered to be a solution to serious issues in application security (AppSec) is now becoming an overcorrection - and is producing problems of its own.
Feb
25,
2026
Will AI Replace Cybersecurity?
When Anthropic launched Claude Code Security in February 2026, cybersecurity stocks dropped within hours. The AI system scans entire codebases, prioritizes vulnerabilities, and proposes patches using advanced reasoning models. For some, this looked like the beginning of the end for traditional security tools.
Oct
1,
2025
The Three and Half Deaths and Rebirth of Application Security: From Chainsaws to Application Detection and Response
From Chainsaws to Application Detection and Response
Sep
3,
2025
The Growing Threat of Security Debt: Exploring AI’s Role in Remediating Persistent Software Vulnerabilities
Managing financial debt is a delicate balancing act, where even the smallest oversight can snowball into significant problems. The same principle applies to business IT in the form of security debt. In other words, accumulated software vulnerabilities that remain unresolved for extended periods. These flaws, particularly those left unaddressed for...









