Compliance
April 20, 2026
Atlassian announced it will begin using customer data from Jira, Confluence, and JSM to improve its AI features, effective August 17, 2026. This reverses their previous public position, and Free/Standard plans are opted in by default.
Breach Analysis
April 19, 2026
Vercel has disclosed unauthorized access to internal systems, with threat actor ShinyHunters claiming possession of NPM and GitHub tokens for Vercel-maintained packages. This briefing covers response actions for Vercel customers and general npm-supply-chain hygiene relevant to any organization consuming npm packages, not just Vercel customers.
Leadership Guide
April 6, 2026
EU Vulnerability Reporting Deadline Hits September 2026, Not December 2027. If you sell software to EU customers, you have less than six months to operationalize 24-hour vulnerability reporting to ENISA.
Threat Advisory
April 3, 2026
In March 2026, attackers compromised four widely-used developer tools — Trivy, Checkmarx KICS, LiteLLM, and Telnyx — silently stealing credentials from an estimated 500,000+ machines. If your CI/CD pipelines ran any of these tools during the affected windows, your cloud credentials may already be at risk.
Threat Advisory
March 4, 2026
Comprehensive analysis of Iran-affiliated cyber threats following Operation Epic Fury. Covers state-sponsored APT group mobilization, hacktivist surge with 60+ active groups, reduced federal cyber support, and 8 prioritized recommendations including SOC coordination, vulnerability patching, ICS/SCADA hardening, and identity controls.
AI Security
February 2026
Attackers can take over a computer by sending a calendar invite to someone using Claude Desktop Extensions. This briefing covers which Claude products face exposure, IT team scanning recommendations, Anthropic's response, and how to evaluate similar risks in other AI tools.
AI Security
August 1, 2025
Publicly shared ChatGPT conversation links have been indexed by search engines, making sensitive business data discoverable via web searches. Covers detection methods, affected entities, and recommended AI usage policy updates.
Leadership Guide
July 9, 2024
Key attributes and skills to evaluate when hiring a Cloud Security Architect. Covers business alignment, security architecture design, IAM, data protection, compliance, incident response, collaboration, and DevSecOps integration.
Breach Analysis
November 1, 2023
Analysis of the Scattered Spider (UNC3944) threat group's attacks on MGM Resorts ($100M impact), Caesars Entertainment ($15M ransom), and Clorox. Covers social engineering tactics, helpdesk manipulation, ransomware deployment, and prioritized defense recommendations.
Breach Analysis
October 31, 2023 • Updated November 30, 2023
Analysis of the Okta customer support system breach, including the November 2023 scope expansion from 134 customers to all support system users. Covers HAR file exposure, session hijacking, identity provider manipulation, and detailed response actions for Okta administrators.