By This Author
Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniseries Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniseries
April 15, 2026
Security operations AI in cybersecurity: The good, the bad, and the FUD AI in cybersecurity: The good, the bad, and the FUD
April 8, 2026
Security operations The RSAC 2026 Conference talks worth catching The RSAC 2026 Conference talks worth catching
March 10, 2026
News & events Hunting for malicious OpenClaw AI in the modern enterprise Hunting for malicious OpenClaw AI in the modern enterprise
March 5, 2026
Threat detection Take back control: A modern guide to mastering application control Take back control: A modern guide to mastering application control
February 10, 2026
Security operations Beyond the bomb: When adversaries bring their own virtual machine for persistence Beyond the bomb: When adversaries bring their own virtual machine for persistence
December 9, 2025
Threat intelligence Empowering your SOC: The strategic imperative of building reliable AI agents Empowering your SOC: The strategic imperative of building reliable AI agents
November 19, 2025
Security operations A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
October 9, 2025
Threat intelligence