Your employees are already using their personal phones for work. They are checking email on the train, joining video calls from their home laptop, and accessing shared drives on the same device they use for everything else. Whether you have a formal policy or not,...
The latest in Featured
In this episode of Inside the Briefcase, host Rocky Giglio speaks with Eric Fourrier, CEO of GitGuardian, about the founding story of the company, the evolution of secrets management in software development, and the impact of AI on security. Eric shares insights on...
New research shows businesses are moving past one-off AI projects toward connected systems that run entire functions, with lead management, content creation, and customer support leading the way. March 11, 2026 – Zapier, the leading AI orchestration platform, today...
Many recent breach postmortems share a common detail. Attackers did not have to hack directly into the system, but simply reused access that already existed. The easiest path to data and systems can now be a forgotten OAuth integration, an overly broad app consent...
Jump to the video --> In this inaugural episode of Inside The Briefcase, Rocky Giglio interviews David Bellini, founder of ConnectWise and CyberFox, discussing his journey in the IT and cybersecurity industry. David shares insights on the evolution of technology,...
The landscape of enterprise risk management and compliance is undergoing a fundamental transformation, driven by artificial intelligence capabilities that promise to revolutionize how organizations identify, assess, and mitigate risks. Recent insights from the Gartner...
A single convincing phishing email compromised 18 critical JavaScript packages with over 2.6 billion weekly downloads, demonstrating how supply chain vulnerabilities can cascade across the entire software ecosystem in hours. On September 8, 2025, at 13:16 UTC, one of...
Executive Summary In an era where organizations face significant pressure to modernize their Governance, Risk, and Compliance (GRC) practices, Policy as Code (PaC) emerges as a transformative approach that fundamentally changes how we manage security and compliance....
By Simon Townsend, Head of the Office of the CTO, ControlUp You don’t have to tell an IT administrator that the global application software market is a juggernaut with no signs of stopping. One report estimates the market will more than double from $385.62 billion in...
Why it matters:Â Enterprise security teams are drowning in fragmented tools that create dangerous blind spots, while sophisticated attacks exploit the gaps between disconnected security solutions. What you'll learn:Â How Cybersecurity Mesh Architecture (CSMA) unifies...


