The vulnerability flood is here. Here’s what it means – and how to prepare
Last week, Thomas Ptacek published a piece arguing that vulnerability research is cooked. His thesis: AI agents are about to...
Last week, Thomas Ptacek published a piece arguing that vulnerability research is cooked. His thesis: AI agents are about to...
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are created, tested,...
Are Non-Human Identities the Missing Piece in Your Cybersecurity Strategy? What Are Non-Human Identities, and Why Are They Important?...
This post is a companion piece to our presentation at Real World Crypto (RWC) 2026 in Taipei, Taiwan on...