Post-Quantum Cryptography: Moving From Awareness to Execution
Lohrmann on Cybersecurity Google recently released important research that moves Q-Day — the day quantum computers will be able...
Lohrmann on Cybersecurity Google recently released important research that moves Q-Day — the day quantum computers will be able...
Companies invest heavily in DDoS mitigation, yet outages still happen—often at the worst possible moment. The problem is rarely...
Is Your Organization Prepared to Manage Non-Human Identities Effectively? The rapid surge in digital transformation has fundamentally shifted how...
Dear blog readers, In my most recent analysis I decided to takea deeper look inside some of the domains...
The rapid adoption of Generative AI Applications across enterprises has transformed productivity, automation, and decision-making. AI tools now power...
IntroductionThere was a significant increase in software supply chain attacks in March 2026. There were five major software supply-chain...
Have You Ever Considered How Securing Non-Human Identities Could Transform Your Organization? Non-Human Identities (NHIs) security is increasingly crucial...
Author, Creator & Presenter: Joshua Saxe, Al Security Technical Lead, Meta Our thanks to prompted for publishing their Creators,...
Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to...
I spent the last week of March 2026 in San Francisco talking to CTOs, CPOs, and engineering leaders from...
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security...
Praetorian is excited to announce the release of Vespasian, a probabilistic API endpoint discovery, enumeration, and analysis tool. Vespasian...
There is a category mistake that happens all the time in the non-human identity (NHI) market. People talk about...
TL;DR Board-ready security metrics translate technical capabilities into financial risk and business outcomes. Boards need visibility across three dimensions:...
Your banking app knows your face. It reads your fingerprint. It trusts that the person holding the phone is...