Security

Cybersecurity threats, protection strategies, and best practices

AI Security: When Authorization Outlives Intent

AI Security: When Authorization Outlives Intent

This is the second blog in a seven-part series on identity security as AI security. TL;DR: A silent breach rippled through the SaaS world in August 2025: demanding no ransomware demand, no s...

Feb 11, 2026 5 min read
Agentic AI and the New Reality of Financial Security

Agentic AI and the New Reality of Financial Security

Agentic AI is no longer experimental. It’s already operating inside production environments, automating workflows, moving data, calling APIs, and making decisions at machine speed. For organizations i...

Feb 17, 2026 5 min read
OpenClaw Threat Model: MAESTRO Framework Analysis

OpenClaw Threat Model: MAESTRO Framework Analysis

Executive Summary This document applies MAESTRO Framework (7-layer Agentic AI Threat Model) to the OpenClaw codebase, identifying specific threats at each layer and detailing mitigation strategies bas...

Feb 17, 2026 5 min read
What is a Risk Engineer?

What is a Risk Engineer?

I've spent my career as an elite security researcher hunting vulnerabilities. My job has always been to think like an attacker: find the gaps and exploit the loopholes. When I bring that same mindset ...

Feb 17, 2026 5 min read
CCM v4.1 Transition Timeline

CCM v4.1 Transition Timeline

This blog was published on February 19, 2026 with the latest information regarding the release of CCM v4.1. On January 28, CSA released version 4.1 of the Cloud Controls Matrix (CCM), succeeding CCM v...

Feb 19, 2026 5 min read
Core Collapse

Core Collapse

  How AI is blowing cybersecurity apart, taking us back to our beginnings, and reforging our foundations. A star dies slowly. Then all at once. A star lives billions of years in tension. Thermal ...

Feb 26, 2026 5 min read
A Complete Guide to Bookmarklets

A Complete Guide to Bookmarklets

Browsers don't just let you bookmark web pages. You can also bookmark JavaScript, allowing you to do so much more than merely save pages. A Complete Guide to Bookmarklets originally published on CSS-T...

Feb 25, 2026 5 min read
An Exploit … in CSS?!

An Exploit … in CSS?!

Read an explanation of the recent CVE-2026-2441 vulnerability that was labeled a "CSS exploit" that "allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page." An E...

Feb 25, 2026 5 min read