TDL 007 | Cyber Warriors & Digital Shadows: Insights from Canada’s Cybersecurity Leader
In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the...
In this episode of The Defender’s Log, host David Redekop interviews Sami Khoury, the Senior Official for Cybersecurity for the...
By Thomas Segura TL;DR: OAuth 2.1 is a solid foundation for MCP, but the non-deterministic nature of agent interactions introduce...
Introduction: The Rising Importance of Proactive Security Okay, so, proactive security – it's kinda a big deal now, right? I...
The Rise of Passwordless Authentication: Why Now? Okay, so passwords, right? We all hate 'em, and honestly, they're not even...
For years, vulnerability management (VM) has been a cornerstone of cybersecurity services. Managed Security Providers (MSPs) and Managed Security...
I once spent three solid days chasing a bug in Azure B2C’s custom policy engine — a mismatch in claim...
Overview Recently, NSFOCUS CERT detected that Samba released a security update to fix the Samba WINS command injection vulnerability (CVE-2025-10230);...
October 16, 2025 Most organizations view file sanitization as the final step, a gatekeeper that prevents malware from entering the...
Vaguely magical and quadranty thing (Gemini) It’s not every day you get to reflect on a journey that started as an...
How Do Non-Human Identities Impact Your Organization’s Cybersecurity Strategy? If you’ve ever pondered the complexities of managing machine identities, you’re...
Are Your Machine Identities Truly Secure? The notion of securing Non-Human Identities (NHIs) often takes center stage. Where machine identities...
What Are Non-Human Identities (NHIs) and Why Are They Crucial for Modern Cybersecurity? Have you ever wondered how machine identities...
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS...
Mid-October Check-In Here we are in mid-October, and 2025 shows no signs of slowing down on the cyber front. In...
One of the challenges with using AI and LLMs to generate code today is that they mostly produce generic code....