Put Security Where Work Actually Happens: The Presentation Layer
Put Security Where Work Actually Happens: The Presentation Layer

Put Security Where Work Actually Happens: The Presentation Layer

(November 5, 2025) 4 min read
From Vulnerability Management to Continuous Threat Exposure Management: Lessons from the CISO Roundtable
 Vulnerability Management to Continuous Threat Exposure Management

From Vulnerability Management to Continuous Threat Exposure Management: Lessons from the CISO Roundtable

(October 27, 2025) 3 min read
Unlocking the Future of Secrets Security
Unlocking the Future of Secrets Security

Unlocking the Future of Secrets Security

(October 9, 2025) 5 min read
How I Replaced Management Consultants with ChatGPT (and a Few Cups of Coffee)
How I Replaced Management Consultants with ChatGPT

How I Replaced Management Consultants with ChatGPT (and a Few Cups of Coffee)

(October 6, 2025) 5 min read
Why the SOC is the Right Place to Start with AI
Why the SOC is the Right Place to Start with AI

Why the SOC is the Right Place to Start with AI

(October 2, 2025) 3 min read
Cyber & The Board: Improving Communication and Finding Common Ground
Cyber & The Board - Improving Communication

Cyber & The Board: Improving Communication and Finding Common Ground

(September 30, 2025) 4 min read
Integration of AI into your organization
Integration of AI into your organization

Integration of AI into your organization

(September 25, 2025) 4 min read
4 Key Metrics AI SOCs Will Impact
4 Key Metrics AI SOCs will Impact

4 Key Metrics AI SOCs Will Impact

(September 24, 2025) 6 min read
Rethinking Secure Access with Enterprise Browsers
Rethinking Secure Access with Enterprise Browsers

Rethinking Secure Access with Enterprise Browsers

(September 22, 2025) 2 min read
AI Is Reshaping Data Security: What Security Leaders Must Prioritize Now
AI Is Reshaping Data Security

AI Is Reshaping Data Security: What Security Leaders Must Prioritize Now

(September 16, 2025) 4 min read