<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Resilient Cyber: Resilient Cyber]]></title><description><![CDATA[Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.]]></description><link>https://www.resilientcyber.io/s/resilient-cyber</link><image><url>https://substackcdn.com/image/fetch/$s_!ITbg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F71894ea3-c231-4d31-90a9-414d75111d0e_1280x1280.png</url><title>Resilient Cyber: Resilient Cyber</title><link>https://www.resilientcyber.io/s/resilient-cyber</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 10:27:18 GMT</lastBuildDate><atom:link href="https://www.resilientcyber.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Chris Hughes]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[resilientcyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[resilientcyber@substack.com]]></itunes:email><itunes:name><![CDATA[Chris Hughes]]></itunes:name></itunes:owner><itunes:author><![CDATA[Chris Hughes]]></itunes:author><googleplay:owner><![CDATA[resilientcyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[resilientcyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[Chris Hughes]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Resilient Cyber Newsletter #61]]></title><description><![CDATA[Security Budget Declines, Cyber Funding Snapshots, AI Bubble, State of AI 2025, Vulnerability Scoring & GRC Engineering Learning Hub]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-61</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-61</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 21 Aug 2025 17:01:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bYjq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to Issue #61 of the Resilient Cyber Newsletter.</p><p>School year is or soon will be upon us, and for those working from home like me, it is a bittersweet time. On one hand, you&#8217;re sad to see the kids go back to school, and on the other, you can begin to at least hear yourself think amongst the backdrop of kids being kids!</p><p>Personal stuff aside, I&#8217;m excited about this issue. We have a lot of great content to explore this week, including the state of security budgets, AI, and deep dives into vulnerability scoring, so let&#8217;s get started.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bYjq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bYjq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 424w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 848w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 1272w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bYjq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png" width="503" height="358.4597701149425" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:558,&quot;width&quot;:783,&quot;resizeWidth&quot;:503,&quot;bytes&quot;:729357,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bYjq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 424w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 848w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 1272w, https://substackcdn.com/image/fetch/$s_!bYjq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e65b360-f3ca-4294-b93a-09e899052cbb_783x558.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity</strong>.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pgwz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 424w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 848w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1272w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png" width="323" height="87.32020997375328" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:103,&quot;width&quot;:381,&quot;resizeWidth&quot;:323,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Varonis Systems Inc | Atlanta Technology Professionals&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Varonis Systems Inc | Atlanta Technology Professionals" title="Varonis Systems Inc | Atlanta Technology Professionals" srcset="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 424w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 848w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1272w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>They&#8217;re Not Breaking In &#8212; They&#8217;re Talking Their Way In</h3><p>ShinyHunters, an emerging threat group, is targeting Salesforce environments using vishing and social engineering. The attacks tend to impersonate IT support, tricking employees into authorizing rogue apps and allowing the threat group to gain persistent access to sensitive data.</p><p>The consequences? Millions of records exposed, financial extortion, and reputational damage across industries like luxury retail, airlines, and financial services.</p><p>Varonis Threat Labs breaks down how these attacks work, how to stop them, and how Varonis can automate Salesforce security for your organization. Learn how attackers exploit trust, abuse OAuth flows, and bypass MFA.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.varonis.com/blog/salesforce-vishing-threat-unc604&quot;,&quot;text&quot;:&quot;Learn more about these cyberattacks&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.varonis.com/blog/salesforce-vishing-threat-unc604"><span>Learn more about these cyberattacks</span></a></p></blockquote><div><hr></div><h1>Cybersecurity Leadership &amp; Market Dynamics</h1><h3><a href="https://www.linkedin.com/posts/philgardnerians_cybersecurity-infosec-ciso-activity-7363963115635417090-QMs1?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Security Budget Growth (Decline) YoY Trends by Industry</a></h3><p>IANS and Artico Search recently conducted a Budget Benchmark Report, which supports many of the pain many have been feeling in cyber. While many quip that cybersecurity is immune and insulated from broader economic headwinds or challenges, as it turns out, that isn&#8217;t always the case.</p><p>Their survey showed that security budget growth is declining or flat in some sectors YoY from 2022-2025. This is likely due to broader economic challenges, but also more scrutiny of security budgets, leadership emphasis on Return on Security Investment (ROSI), and the push for consolidation and to get a handle on security tool sprawl that is driving the platformization push in the industry that Palo Alto Networks and others are making.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2MIf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2MIf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 424w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 848w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 1272w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2MIf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png" width="349" height="432.68561278863234" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:698,&quot;width&quot;:563,&quot;resizeWidth&quot;:349,&quot;bytes&quot;:272761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2MIf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 424w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 848w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 1272w, https://substackcdn.com/image/fetch/$s_!2MIf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c33dff2-69ec-4491-abe9-ab7f6290dea6_563x698.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.linkedin.com/posts/matthewball2_emerging-cybersecurity-vendors-frequently-activity-7363184946049343490-Nt94?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Cybersecurity Funding Snapshot</a></h3><p>I continue to follow Matthew Ball of Canalys because he routinely shares excellent insights on the cyber ecosystem from a market perspective. He recently shared the image below along with some helpful insights. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xwB6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xwB6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 424w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 848w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 1272w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xwB6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png" width="428" height="723" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:723,&quot;width&quot;:428,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:336481,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xwB6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 424w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 848w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 1272w, https://substackcdn.com/image/fetch/$s_!xwB6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fce4765-5758-4e6f-9f69-71107b7d3b10_428x723.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Matt covered key points, such as:</p><ul><li><p>In the first half/six months of 2025, pre-IPO cyber vendors raised a total of $6.74 <strong>billion</strong>, across 350 funding rounds and slightly higher than the same period in 2024, which was $6.72</p></li><li><p>63 vendors are emerging as the next wave of partners, raising significant funding, and these are firms that have been around for 12 years on average</p></li><li><p>Others are positioned to scale quickly, accumulating over $100 million or other values below that, but with strong indicators of future growth, seen at the bottom of the image<br></p></li></ul><h3><a href="https://www.linkedin.com/posts/jaymcbain_emerging-cybersecurity-vendors-frequently-activity-7363324048707051521-6bun?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Cyber Funding Snapshot and Funding Rounds</a></h3><p>Speaking of Canalys, Jay McBain, who works with Matthew, whom I cited above, also shared some great insights recently. This includes the fact that the Top 20 pre-IPO cyber companies have raised more than <strong>$20.60 billion</strong> this year (end of Q2 2025). The largest funding rounds involve leaders such as Cyera, Chainguard, Island, and others. </p><p>Jay points out that 73% of the funding was by US-headquartered firms, followed by 14% from Israel.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JXYO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JXYO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 424w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 848w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 1272w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JXYO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png" width="569" height="643.1397174254317" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:637,&quot;resizeWidth&quot;:569,&quot;bytes&quot;:356362,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JXYO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 424w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 848w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 1272w, https://substackcdn.com/image/fetch/$s_!JXYO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F959f4e29-81fd-4951-89dc-2cbbe81363c0_637x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/competitive-advantage-through-cybersecurity-a-board-level-perspective">Competitive Advantage Through Cybersecurity: A Board-Level Perspective</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wL5l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wL5l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 424w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 848w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 1272w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wL5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png" width="1456" height="341" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:341,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:547916,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wL5l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 424w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 848w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 1272w, https://substackcdn.com/image/fetch/$s_!wL5l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2c6791-2e96-40f1-a0d7-555ac5cd0ad8_1630x382.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This piece from McKinsey and NACD captured insights from five industry-leading CISOs and board directors about how cybersecurity is changing and how CISOs and Directors can use their position and influence to drive competitive advantage through cybersecurity. </p><p>The CISOs being interviewed discuss the challenges of dealing with diverse boards, many of whom have financial and business backgrounds rather than technology backgrounds. They also share insights on how they prepare for board meetings and position cyber issues for input and awareness.</p><p>The interview provides valuable perspectives from existing CISOs and board members and is worth reading for those looking to understand better how they can communicate cyber issues to the board.</p><h3><a href="https://www.reforge.com/blog/the-big-squeeze">Why Escape Velocity Is More Important Than Ever</a></h3><p>This piece from Reforge also discusses the need to achieve accelerated ARR and broader revenue goals. It opens by discussing how Lovable hit $100M ARR in just 8 months from launch, outpacing traditional metrics, even for outstanding industry-leading firms. Many rapidly growing firms focus on &#8220;Vibe Coding&#8221; or supporting development workflows more broadly, including examples such as Glean, Cursor, and Codium. These firms hit the Development Platform and Tooling aspect of the previous piece I shared from Bessemer.</p><p>Using Lovable as an example, the author discusses how they have navigated three distinct market trends:</p><ul><li><p>Massive AI interest</p></li><li><p>Incumbent mirroring</p></li><li><p>Distribution scarcity</p></li></ul><p>This includes riding the wave of AI hype, incumbents copying innovators, and a distribution scarcity creating intense competition.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dnV0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dnV0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 424w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 848w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 1272w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dnV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png" width="1138" height="672" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:1138,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:230939,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!dnV0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 424w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 848w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 1272w, https://substackcdn.com/image/fetch/$s_!dnV0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F093cabc0-cef6-44d5-9ce5-c1a05486c8fd_1138x672.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They argue that this is causing startups to need to get massive distribution quickly to reach &#8220;escape velocity&#8221; and stay on a trajectory to be lasting industry leaders. As the author notes, speed cuts both ways, though. Just as quickly as an innovator can get breakout velocity, incumbents can copy them. </p><p>While the piece isn&#8217;t about cybersecurity, many of the same principles apply to the cybersecurity startup and incumbent landscape.</p><h3><a href="https://www.theverge.com/ai-artificial-intelligence/759965/sam-altman-openai-ai-bubble-interview">Yes, AI is in a Bubble</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JmaC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JmaC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 424w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 848w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 1272w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JmaC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png" width="1345" height="484" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:1345,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:329193,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JmaC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 424w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 848w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 1272w, https://substackcdn.com/image/fetch/$s_!JmaC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F43809144-4e2b-47e7-82f7-bed17dcc223c_1345x484.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At least according to OpenAI CEO Sam Altman. Sam recently discussed that investors are overexcited about AI and compared the current market fervor to the 1990s during the dot-com bubble, which, as we all know, was eventually followed by an associated crash. </p><p>Sam cited the small team sizes, high valuations, and abnormally large funding rounds as evidence of the current market hype around AI. He even went on to say:</p><blockquote><p><strong>&#8220;That&#8217;s not rational behavior, someone&#8217;s going to get burned there, I think&#8221;</strong></p></blockquote><p>Continuing the interview, Sam said he expects OpenAI to survive the forthcoming burst and that they intend to spend trillions on data center construction soon.</p><p>Sam&#8217;s comments reminded me of recent comments from Peter Walker, Head of Insights at Carta, whom I regularly follow.</p><p>Peter <a href="https://www.linkedin.com/posts/peterjameswalker_startups-founders-startupbubble-activity-7362910058956931072-m2YU?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">recently stated:</a></p><blockquote><p><strong>&#8220;We are back in a startup bubble, 4 years after the 2021 bubble peaked&#8221;. </strong></p></blockquote><p>Peter shared the below image, stating medium figures in every stage are higher than they were last year and rival all-time peak values and points out in some cases (such as the WOW column) we are in a new peak bubble that even makes 2021 look weak. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mgr7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mgr7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 424w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 848w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 1272w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mgr7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png" width="503" height="499.5500685871056" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86ad2346-18d2-469b-b829-ad4af569a169_729x724.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:724,&quot;width&quot;:729,&quot;resizeWidth&quot;:503,&quot;bytes&quot;:339560,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Mgr7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 424w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 848w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 1272w, https://substackcdn.com/image/fetch/$s_!Mgr7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86ad2346-18d2-469b-b829-ad4af569a169_729x724.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://www.bvp.com/atlas/the-state-of-ai-2025">The State of AI 2025 </a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wSsp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wSsp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 424w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 848w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 1272w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wSsp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png" width="373" height="246.01068090787717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:494,&quot;width&quot;:749,&quot;resizeWidth&quot;:373,&quot;bytes&quot;:401709,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wSsp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 424w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 848w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 1272w, https://substackcdn.com/image/fetch/$s_!wSsp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c930dc1-d100-4953-979d-c85d63d38a09_749x494.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI, of course, is dominating headlines, including everything from venture capital to cybersecurity. That is why it was great to check out this State of AI Report from Bessemer Venture Partners (BVP). </p><p>As the report discusses, we&#8217;re moving past AI's initial big bang and starting to get a stable sense of the ecosystem, including foundational companies, best practices for building, and patterns for startup success. </p><p>One of the biggest takeaways from the report is how AI has redefined what &#8220;good&#8221; looks like from a metrics and benchmark perspective, no longer aligning with benchmarks from the SaaS era. </p><p>Since 2023, Bessemer has deployed over <strong>$1 billion</strong> in capital to AI-native startups. Not only are countless AI-native startups forming, but every established SaaS company is now weaving AI capabilities into its products as well. </p><p>Below are examples of new benchmarks when it comes to AI-native startups:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xw1S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xw1S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 424w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 848w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 1272w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xw1S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png" width="606" height="344.2029288702929" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd18b961-7912-42da-949c-51d1ca533b16_956x543.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:543,&quot;width&quot;:956,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:170850,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xw1S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 424w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 848w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 1272w, https://substackcdn.com/image/fetch/$s_!Xw1S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd18b961-7912-42da-949c-51d1ca533b16_956x543.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6EgT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6EgT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 424w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 848w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 1272w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6EgT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png" width="599" height="345.69779643231897" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:550,&quot;width&quot;:953,&quot;resizeWidth&quot;:599,&quot;bytes&quot;:161019,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6EgT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 424w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 848w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 1272w, https://substackcdn.com/image/fetch/$s_!6EgT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fd59d65-f0b6-48df-9bd1-bc8fe2d0f26c_953x550.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They draw distinctions between what they dub &#8220;supernovas&#8221; and &#8220;shooting stars,&#8221; showing the wide range and disparities among AI-native startups. Some achieve unheard-of, rampant, accelerated growth, while others achieve substantial growth by traditional standards. Despite the rapid ARR growth, the report does highlight how tight margins are, being close to zero or even negative in some cases, and we have seen some highlight this with memes, including inference costs, etc. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Z8T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Z8T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 424w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 848w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 1272w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Z8T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png" width="242" height="360.0487804878049" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:854,&quot;width&quot;:574,&quot;resizeWidth&quot;:242,&quot;bytes&quot;:546305,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1Z8T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 424w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 848w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 1272w, https://substackcdn.com/image/fetch/$s_!1Z8T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1d33608-6181-4012-bb53-f0963d41b9e3_574x854.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report provides some insights into the average gross margins of the supernovas, as listed below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TXZI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TXZI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 424w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 848w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 1272w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TXZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png" width="993" height="520" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:520,&quot;width&quot;:993,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TXZI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 424w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 848w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 1272w, https://substackcdn.com/image/fetch/$s_!TXZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfcd60bc-4847-4da2-8170-d8c1fda439e5_993x520.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They discussed how AI &#8220;Shooting Stars&#8221; more closely resemble traditional SaaS companies, with quick PMF and customer retention/expansion, but not as insane initial ARR&#8217;s. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MjnA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MjnA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 424w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 848w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 1272w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MjnA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png" width="988" height="601" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:601,&quot;width&quot;:988,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:77491,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MjnA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 424w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 848w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 1272w, https://substackcdn.com/image/fetch/$s_!MjnA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd945a1c-378c-4c6f-a326-10f3dfe59a2b_988x601.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While it could be tempting for founders to hyperfocus on supernovas, Bessemer argues that the shooting stars will include hundreds of new startups, which is what AI founders should aim for. </p><p>The report then discusses a roadmap for the AI cosmos, including AI infrastructure, developer platforms and tooling, horizontal and enterprise AI, vertical AI, and consumer AI. It also lays out five key predictions. </p><h3><strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-andrew-carney-darpa">Resilient Cyber w/ Andrew Carney DARPA AI Cyber Challenge AIxCC</a></strong></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sL7R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sL7R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 424w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 848w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 1272w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sL7R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png" width="191" height="152.90581717451525" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:289,&quot;width&quot;:361,&quot;resizeWidth&quot;:191,&quot;bytes&quot;:108549,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sL7R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 424w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 848w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 1272w, https://substackcdn.com/image/fetch/$s_!sL7R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04777d3b-36bb-4742-8e94-83142bcbfc84_361x289.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>In this episode, I interview Andrew Carney, the Program Manager for DARPA's <a href="https://aicyberchallenge.com/">AI Cyber Challenge (AIxCC</a>).<br><br>DARPA's AIxCC recently concluded at Black Hat, and it brought together the industry's leading experts on AI and Cybersecurity, focusing on securing software critical to all Americans.<br><br>Teams had to create novel AI systems to secure critical code, including software involved in critical infrastructure.</p><div><hr></div><p>Listen on:</p><ul><li><p><strong><a href="https://podcasts.apple.com/us/podcast/resilient-cyber-w-andrew-carney-darpa-ai-cyber-challenge/id1555928024?i=1000722947552">Apple Podcasts</a></strong></p></li><li><p><strong><a href="https://open.spotify.com/episode/3wohJDK4SjWZFtDdClTPpB?si=eh6mNcEWT4aYJjei7-bfKw">Spotify</a></strong></p></li><li><p><strong><a href="https://youtu.be/z73-wxQV1kI?si=tga5QMy8e5IY2QPd">YouTube</a></strong></p><div><hr></div><p>We discussed:</p></li><li><p>The background of the DARPA AI Cyber Challenge and some of DARPA's historical work, including the Internet!</p></li><li><p>The importance of open source software and how it powers everything from consumer goods to critical infrastructure and national security systems</p></li><li><p>How the challenge worked, and the way teams used AI and autonomous systems not only to discover but also help patch/remediate vulnerabilities</p></li><li><p>The dual nature of AI and how it can be wielded for defenders and attackers alike</p></li><li><p>What DARPA is up to next</p></li></ul><div id="youtube2-z73-wxQV1kI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;z73-wxQV1kI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/z73-wxQV1kI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://csrc.nist.gov/projects/cosais">NIST to Release Security Control Overlay for Securing AI Systems</a></h3><p>NIST recently released a <strong><a href="https://csrc.nist.gov/csrc/media/Projects/cosais/documents/NIST-Overlays-SecuringAI-concept-paper.pdf">concept paper</a></strong> and announced that it will release a security control overlay for securing AI systems for its NIST 800-53 security control catalog, which underpins many popular compliance frameworks, such as FedRAMP, RMF, CSF, and more. </p><p>They laid out how the 800-53 AI Security Control Overlay intercedes with other related NIST AI efforts such as the AI RMF and others below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jd60!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jd60!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 424w, https://substackcdn.com/image/fetch/$s_!jd60!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 848w, https://substackcdn.com/image/fetch/$s_!jd60!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 1272w, https://substackcdn.com/image/fetch/$s_!jd60!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jd60!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png" width="958" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:958,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:161796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jd60!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 424w, https://substackcdn.com/image/fetch/$s_!jd60!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 848w, https://substackcdn.com/image/fetch/$s_!jd60!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 1272w, https://substackcdn.com/image/fetch/$s_!jd60!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b127f3d-fd68-4c88-b1f7-128f40972d2e_958x675.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In short, the overlays aim to provide security controls to manage unique risks for users and developers of AI systems in specific scenarios. They also envision it being able to be used by both organizations using AI, as well as developers of systems involving AI: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iFwA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iFwA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 424w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 848w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 1272w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iFwA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png" width="560" height="490" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:490,&quot;width&quot;:560,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:295851,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iFwA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 424w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 848w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 1272w, https://substackcdn.com/image/fetch/$s_!iFwA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F778272b2-cd0c-4143-8aa8-f8d0fde4bbb7_560x490.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AppSec, Vulnerability Management &amp; Software Supply Chain</h1><h3><a href="https://arxiv.org/abs/2508.13644">Conflicting Scores, Confusing Signals: An Empirical Study of Vulnerability Scoring Systems</a></h3><p>The more time I spend in this field, the more I believe that Vulnerability Scoring systems are all flawed, imperfect, and just one indicator to drive vulnerability prioritization.<br><br>This latest research confirms that, including a lack of correlation across scoring frameworks, limited accuracy in exploitation (including for EPSS), and overall provide limited triage guidance in isolation.<br><br>More and more I'm convinced of the importance of organizational context, business criticality, data sensitivity, reachability, architectural considerations, compensating/mitigating controls and runtime detection and response.<br><br>I know we all wish there was a silver bullet and that the "x" vulnerability scoring framework would be the panacea for prioritization, but that isn't how any of this works, and it likely never will be.<br><br>There are no shortcuts - you have to do the work &#129335;&#8205;&#9794;&#65039;</p><h3><a href="https://www.networkworld.com/article/4039042/def-con-research-takes-aim-at-ztna-calls-it-a-bust.html">Zero Trust is a Bust</a></h3><p>Or, at least the leading ZT tools are. That was one of the key points recently made at DEFCON. While ZT has been a trend and term cyber marketing teams have clung to for years, researchers have shown that the leading ZT vendors/tools are rife with vulnerabilities and weaknesses.</p><p>They found Checkpoints' product had hard-coded encryption keys, which exposed customer data, Zscaler&#8217;s SAML implementation failed to validate signatures, and Netskope suffered from cross-tenant vulnerabilities, letting attackers compromise any organization using leaked enrollment keys. All of these examples violate fundamental tenets of ZT.</p><p>This also aligns with an article I wrote recently, calling out the uncomfortable truth that &#8220;<strong><a href="https://www.resilientcyber.io/p/elephant-in-the-room-your-security">Your Security Tools May Be Making You Insecure</a></strong>&#8221;. In the piece, I spoke about the fact that many security tools are vulnerable and often shelfware, not fully implemented, configured, tuned or used - leaving organizations more vulnerable as these products sit around with elevated permissions and access.</p><h3><a href="https://www.lawfaremedia.org/article/a--window-sticker--for-software">A &#8220;Window Sticker&#8221; for Software</a></h3><p>We&#8217;ve heard a lot about software supply chain security in the last several years, since the fallout of events such as Log4j, SolarWinds, and others, as well as the Federal Executive Order (EO), which placed a large emphasis on supply chain security. <br><br>Hell, I even wrote a book titled &#8220;<strong>Software Transparency</strong>&#8221; on the topic. </p><p>This piece from Lawfare discusses the concept of a &#8220;Window Sticker&#8221; for software, and how buyers can use performance measures to drive better security in software products. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A5J4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A5J4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 424w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 848w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 1272w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A5J4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png" width="724" height="441.9220779220779" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:611,&quot;width&quot;:1001,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:200852,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A5J4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 424w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 848w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 1272w, https://substackcdn.com/image/fetch/$s_!A5J4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F223f8e0b-a9b9-43a7-85ab-1e881298bd76_1001x611.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The above image exemplifies what the proposed sticker &#8220;could&#8221; include, citing examples of compliance alignment, CISA&#8217;s SbD pledge, SCA results, product security features, etc.</p><p>While on the surface, this is a well-intentioned concept and not a new one, and I like the idea of trying to drive consumers to force vendors to create more security products, the reality is much more nuanced than this. </p><p>Most consumers understand little of what this image shows, and more importantly, they know that there is a significant amount of nuance and details this image can&#8217;t reflect. </p><p>CISA SbD signatories such as Fortinet and others routinely drop news of their products being exploited by zero days. SBOMs have lingering challenges around completeness, correctness, and quality. Not all SCA &#8220;Criticals&#8221; and &#8220;Highs&#8221; reflect real-world risk when aligning with CVSS, and much more. </p><p>Due to these complexities and the fact that consumers often want the cheapest, not the most secure products, I don&#8217;t anticipate this vision becoming a reality anytime soon.</p><h3><a href="https://grc.engineering/learning-hub/">GRC Engineering Learning Hub</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C2_m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C2_m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 424w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 848w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 1272w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C2_m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png" width="289" height="42" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:42,&quot;width&quot;:289,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14701,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C2_m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 424w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 848w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 1272w, https://substackcdn.com/image/fetch/$s_!C2_m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F786adbab-7737-4e6d-8255-4cf9ac18e268_289x42.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>You&#8217;ve heard me talk a lot about GRC Engineering, and the crew that released the GRC Engineering Manifesto recently released a Learning Hub. This includes, books, courses, labs and podcasts on the topic. </p><p>I was pleasantly surprised to see my own conversation with my friend AJ Yawn&#8217;s conversation listed among the podcasts. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hIR6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hIR6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 424w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 848w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 1272w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hIR6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png" width="1233" height="473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:473,&quot;width&quot;:1233,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:77980,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/171204889?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hIR6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 424w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 848w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 1272w, https://substackcdn.com/image/fetch/$s_!hIR6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f3ff9e-b8f0-45a0-b112-78e71a665ebc_1233x473.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It also lists a lot of helpful blogs, newsletters and talks and interviews. The learning hub is worth bookmarking and referencing for those interested in GRC Engineering.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #60]]></title><description><![CDATA[State of Security Vendors, AI Eats VC, FedRAMP Doubles Down, DARPA AIxCC, AgentFlayer, Securing Agentic AI & CVE Transparency Challenges]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-60</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-60</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 14 Aug 2025 11:01:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YqVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to the post Black Hat issue of the Resilient Cyber Newsletter.</p><p>Coming out of Hacker Summer Camp week, it feels like everyone is trying to catch their breath, dig out of their inbox, and get back into a flow. </p><p>I&#8217;ve got a lot of great resources this week to share, including a Black Hat Security Vendor Breakdown, AI&#8217;s impact on VC, discussions on securing agentic AI, and a look into transparency challenges with CVEs.</p><p>So, here we go!</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YqVe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YqVe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 424w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 848w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YqVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png" width="555" height="402.1462912087912" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1055,&quot;width&quot;:1456,&quot;resizeWidth&quot;:555,&quot;bytes&quot;:2471662,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YqVe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 424w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 848w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!YqVe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9515233f-33c3-4b62-a11b-7b177c1681d5_1562x1132.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity</strong>.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yyaU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yyaU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 424w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 848w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 1272w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yyaU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png" width="616" height="52.88461538461539" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/afbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:125,&quot;width&quot;:1456,&quot;resizeWidth&quot;:616,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yyaU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 424w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 848w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 1272w, https://substackcdn.com/image/fetch/$s_!yyaU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafbeea11-9e6a-42c1-a995-c1e831dd21b1_1600x137.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>AppSec&#8217;s New Horizon</h3><p>As development teams move faster, shift-left strategies have stalled at detection and aren't keeping security issues out of production.</p><p>Join the <a href="https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html?utm_source=ResilientCyber&amp;utm_medium=eNewsletter-0816&amp;utm_campaign=L2-BSAP-AppSec&amp;utm_content=AppSec-Virtual-Event">upcoming virtual event</a> to get a practical, prevention-first AppSec blueprint&#8212;powered by new Unit 42&#174; research and <a href="https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html?utm_source=ResilientCyber&amp;utm_medium=eNewsletter-0816&amp;utm_campaign=L2-BSAP-AppSec&amp;utm_content=AppSec-Virtual-Event">real-world lessons from Palo Alto Networks' own security teams</a>.</p><p>Learn how to stay ahead of emerging threats, intelligently block risks from reaching production, and <a href="https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html?utm_source=ResilientCyber&amp;utm_medium=eNewsletter-0816&amp;utm_campaign=L2-BSAP-AppSec&amp;utm_content=AppSec-Virtual-Event">scale AppSec without slowing developers down</a>.</p><p>Don&#8217;t miss this look into the future of application security with Cortex&#174; Cloud.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html?utm_source=ResilientCyber&amp;utm_medium=eNewsletter-0816&amp;utm_campaign=L2-BSAP-AppSec&amp;utm_content=AppSec-Virtual-Event&quot;,&quot;text&quot;:&quot;Secure your spot&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html?utm_source=ResilientCyber&amp;utm_medium=eNewsletter-0816&amp;utm_campaign=L2-BSAP-AppSec&amp;utm_content=AppSec-Virtual-Event"><span>Secure your spot</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.duha.co/state-of-security-vendors-blackhat-2025/">The State of Security Vendors - Black Hat 2025</a></h3><p>If you&#8217;re like me, you unfortunately (or fortunately) didn&#8217;t make it out to Black Hat/Hacker Summer Camp this year, but are still looking to keep up to date with how it went, key takeaways, themes, and so on. </p><p>Luckily, industry leader Andy Ellis put together a concise summer:</p><ul><li><p>359 total vendors</p></li><li><p>118 vendors mentioned AI</p><ul><li><p>18 mentioned securing your AI usage</p></li><li><p>20 mentioned agents/agentic</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lUUs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lUUs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 424w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 848w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 1272w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lUUs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png" width="477" height="287.4635761589404" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:546,&quot;width&quot;:906,&quot;resizeWidth&quot;:477,&quot;bytes&quot;:89127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lUUs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 424w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 848w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 1272w, https://substackcdn.com/image/fetch/$s_!lUUs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22c0021a-aa2a-4310-a6ec-b299e56388d8_906x546.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>Code Security was the largest presence, with 105 vendors</p></li><li><p>32 vendors mentioned being a platform, leaning into the platform vs. point solution play</p></li><li><p>Zero Trust was only emphasized in 6 booths, demonstrating that the trend seems to be dying down a bit</p></li></ul><p>The report is full of these insights and much more, and I personally appreciate Andy putting this together for the community, especially those of us who couldn&#8217;t make it to the event this year. </p><h3><a href="https://www.linkedin.com/posts/matthewball2_canalys-part-of-omdia-analyzed-104-cybersecurity-related-activity-7360620859771764736-NIYh?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Platform Expansion via M&amp;A</a></h3><p>We hear a ton about the push for &#8220;platformization&#8221;, or consolidation, as large vendors such as Palo Alto Networks (PANW) make the case for Platforms vs. Best of Breed, but seeing metrics and drivers is helpful. </p><p>Matthew Ball of Canalys recently shared some of those insights, showing how platform expansion is driving M&amp;A and how the majority of M&amp;A involves pre-IPO-funded companies, with less than 20 firms being by far the most active acquirers. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4axi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4axi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 424w, https://substackcdn.com/image/fetch/$s_!4axi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 848w, https://substackcdn.com/image/fetch/$s_!4axi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 1272w, https://substackcdn.com/image/fetch/$s_!4axi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4axi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png" width="543" height="902.3768115942029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1376,&quot;width&quot;:828,&quot;resizeWidth&quot;:543,&quot;bytes&quot;:1033151,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4axi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 424w, https://substackcdn.com/image/fetch/$s_!4axi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 848w, https://substackcdn.com/image/fetch/$s_!4axi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 1272w, https://substackcdn.com/image/fetch/$s_!4axi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f4140ef-f659-4947-b0ee-3335566cebf6_828x1376.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>He points out some of the acquisitions they analyzed: 104 acquisitions by 44 acquirers from 2022 to 2025 so far. The most active acquirers include some familiar faces, such as Cisco, Palo Alto Networks, Checkpoint, Proofpoint, ZScaler, Crowdstrike, and others. If you read the recent piece on industry consolidation I shared from my friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;9a5da8ea-561d-492a-8829-7a2895922dba&quot;}" data-component-name="MentionToDOM"></span>, you&#8217;ll also recognize many of these vendors and trends. These 104 acquisitions totaled $154 billion. </p><p>Matthew provides rich analysis in his post I linked to, so I suggest going to read it, but some key takeaways:</p><ul><li><p>Of the 86 pre-IPO acquired companies</p><ul><li><p>33% were seed or pre-seed</p></li><li><p>49% were early stage (e.g., Series A or B), with Series A being the most common</p></li><li><p>The remaining 19% were Series C or beyond</p></li></ul><p>These activities involved over 500 investors, with Cisco again being the most active, but other large names such as Salesforce Ventures, Sequoia, and Insight Partners.</p></li></ul><h3><strong><a href="https://www.linkedin.com/pulse/ai-eating-venture-capital-vc-dry-powder-forecast-jon-sakoda-dho8f/">AI is Eating Venture Capital: The VC Dry Powder Forecast</a></strong></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LzWi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LzWi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 424w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 848w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 1272w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LzWi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png" width="470" height="223.70192307692307" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:693,&quot;width&quot;:1456,&quot;resizeWidth&quot;:470,&quot;bytes&quot;:1140842,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LzWi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 424w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 848w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 1272w, https://substackcdn.com/image/fetch/$s_!LzWi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2adc24f-d621-4bb3-a86b-63417ac5df50_1466x698.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>I found this piece from Jon Sakoda of Decibel Partners to be very interesting. Jon lays out the dynamic that is playing out, where a significant share of &#8220;dry powder&#8221; (e.g. VC fund cash on hand) is being deployed, largely to AI and AI-focused firms, but at the same time, fundraising is hitting lows. </p><p>Jon states:</p><blockquote><p><strong>2025 has been one of the best years in the history of venture capital for founders, with over 10,000 companies announcing $162 billion in financings in just 6 months. These numbers rival the glory days of 2021 - the stock markets are back to all time highs, the AI platform shift is in full swing, and the VC industry is on pace to make this year the most active in its history. Now that the party has started, do we know how long it will last?</strong></p></blockquote><p>As he discusses, AI has dominated VC investments, representing 60% of all investments. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rWSi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rWSi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 424w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 848w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 1272w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rWSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png" width="1456" height="866" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:866,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:216441,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rWSi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 424w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 848w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 1272w, https://substackcdn.com/image/fetch/$s_!rWSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F349ddd04-04f6-40c3-bbad-c0ed7a87da61_1728x1028.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But as Jon shows, despite this tremendous run of investments, fundraising has taken a massive dip:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OfQy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OfQy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 424w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 848w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 1272w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OfQy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png" width="1456" height="693" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:693,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:173968,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OfQy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 424w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 848w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 1272w, https://substackcdn.com/image/fetch/$s_!OfQy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47f26196-16e5-4208-99d1-d4488470a77d_1714x816.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jon demonstrates that we&#8217;re well through the high dry powder phase, with massive allocations having taken place:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4-lc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4-lc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 424w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 848w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 1272w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4-lc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png" width="1456" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:232632,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4-lc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 424w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 848w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 1272w, https://substackcdn.com/image/fetch/$s_!4-lc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66ab4f03-5873-4f29-af6d-2e8ee78b65da_1772x890.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jon isn&#8217;t necessarily saying there is trouble at hand, but the metrics above do present good questions about what the landscape will look like in the coming years, as firms are &#8220;all-in&#8221; on AI-centric investments, exhausting a good deal of dry powder, but without substantial new fundraising occurring, what will backfill it and what are the implications for future founders not riding the present wave?</p><h3><a href="https://www.nextgov.com/modernization/2025/08/gsa-doubles-fedramp-authorizations-compared-last-year/407354/?oref=ng-skybox-hp">GSA Doubles FedRAMP Authorizations Compared to Last Year</a></h3><p>In an amazing demonstration of program modernization and innovation, the U.S. Federal governments Cloud Compliance &amp; Authorization program, FedRAMP, has doubled its number of authorized cloud services in 2025 compared to the year prior. This is part of the broader FedRAMP 20x efforts by the FedRAMP PMO, who have been embracing GRC Engineering principles and modernizations such as:</p><ul><li><p>Context-rich vulnerability prioritization and remediation</p></li><li><p>Automating assessments using API&#8217;s and Cloud-native services</p></li><li><p>Leaning into engineering principles such as IaC, machine readable artifacts and automated workflows</p></li></ul><p>This is a great example for industry and government alike of the direction that Governance, Risk and Compliance (GRC) should be heading to catch up with technological and engineering trends that have largely left the compliance industry behind.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.fedramp.gov/20x/goals/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WX-n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 424w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 848w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 1272w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WX-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png" width="1456" height="296" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:296,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:819105,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.fedramp.gov/20x/goals/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WX-n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 424w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 848w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 1272w, https://substackcdn.com/image/fetch/$s_!WX-n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cc0b1c-3e45-45bb-b8b2-2fe0b58400f9_2166x440.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://www.darpa.mil/news/2025/aixcc-results">DARPA Announces AI Cyber Challenge Winner</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tMMi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tMMi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 424w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 848w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 1272w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tMMi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png" width="316" height="245.0462962962963" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c392421-535d-4286-98a4-555c93358680_864x670.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:864,&quot;resizeWidth&quot;:316,&quot;bytes&quot;:272035,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tMMi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 424w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 848w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 1272w, https://substackcdn.com/image/fetch/$s_!tMMi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c392421-535d-4286-98a4-555c93358680_864x670.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>DARPA recently announced the winner of its AI Cyber Challenge (AIxCC). The challenge involves using AI-driven systems that are capable of identifying and patching real world vulnerabilities. Team Atlanta, which won, among others, were able to demonstrate their AI-driven systems could identify and patch vulnerabilities in open source software, including those impacting critical infrastructure.</p><p>This is a really promising effort that has large implications for cyber defenders if the technologies can be refined and scaled to keep pace with attackers attempts to exploit vulnerabilities. </p><p>I&#8217;ll be interviewing Andrew Carney of DARPA on my Resilient Cyber Show soon to dive into this so be sure to keep an eye out for that discussion!</p><h3><a href="https://www.ultrared.ai/blog/building-autonomous-ai-hacker">I Built an AI Hacker. It Failed Spectacularly </a></h3><p>With all the headlines about AI-powered offensive security tools overtaking leaderboards such as Hacker One or LLMs finding zero days, many would assume that AI hacking tools are well on their way to being amazing resources in Offensive Security. </p><p>The truth is that it is a bit more complicated than that, as Romy Haik lays out in a recent blog. He set out to build an autonomous agentic pen testing tool. As he mentions, on the surface, the idea is enticing to the entire industry, these autonomous tools and capabilities that never rest, constantly testing, exploiting, and identifying new vulnerabilities and aspects of systems that need to be bolstered; however, his reality proved to be a bit more nuanced than that. </p><p>He built a multi-component and phase AI hacking tool to carry out various aspects of the attack lifecycle:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!57jz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!57jz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 424w, https://substackcdn.com/image/fetch/$s_!57jz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 848w, https://substackcdn.com/image/fetch/$s_!57jz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 1272w, https://substackcdn.com/image/fetch/$s_!57jz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!57jz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png" width="1456" height="1601" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1601,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:530433,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!57jz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 424w, https://substackcdn.com/image/fetch/$s_!57jz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 848w, https://substackcdn.com/image/fetch/$s_!57jz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 1272w, https://substackcdn.com/image/fetch/$s_!57jz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8c85256-eef8-489f-a71f-fa76e7e72b0e_1504x1654.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>He then pointed at intentionally vulnerable resources typically used for AppSec testing and learning. The results?</p><p><strong>My Autonomous AI:</strong></p><ul><li><p>&#9989; 1 Remote Code Execution (RCE)</p></li><li><p>&#9989; 1 SQL Injection</p></li><li><p>&#9989; 3 Cross-Site Scripting (XSS)</p></li><li><p>&#10060; Massive number of false positives</p></li><li><p>&#10060; Even more false negatives</p></li></ul><p>He also lays out some aspects beyond AppSec that are tied to the economics of AI as well:</p><h4><strong>The Brutal Economics of AI Hacking</strong></h4><p>The performance gap was embarrassing, but the cost analysis was the real gut punch:</p><ul><li><p><strong>Runtime:</strong> 100 iterations took 3+ hours (sometimes 25 iterations took over an hour)</p></li><li><p><strong>Compute costs:</strong> Cloud infrastructure running continuously</p></li><li><p><strong>API costs:</strong> Thousands of OpenAI calls for planning, execution, and parsing</p></li><li><p><strong>Accuracy:</strong> Significantly worse than both humans AND traditional tools</p></li></ul><p>The system wasn't just slower than a human. It was more expensive and far less accurate.</p><p>He lays out some painful lessons learned regarding AI and LLMs for OffSec and advocates for a hybrid approach of using AI as a force multiplier rather than a full replacement. </p><p>None of this is to say that AI doesn&#8217;t and can&#8217;t be effective for OffSec, but that it isn&#8217;t as simple as many suspect. </p><h3><a href="https://cloudsecurityalliance.org/artifacts/secure-agentic-system-design">Securing Agentic System Design: A Trait-Based Approach</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fDrl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fDrl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 424w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 848w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 1272w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fDrl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png" width="191" height="248.37262357414448" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:342,&quot;width&quot;:263,&quot;resizeWidth&quot;:191,&quot;bytes&quot;:124779,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fDrl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 424w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 848w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 1272w, https://substackcdn.com/image/fetch/$s_!fDrl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6655abba-cf91-4a6e-81fe-6fefff65ed38_263x342.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s no denying that agentic systems and workflows introduce some unique considerations for cyber defenders. This piece from Cloud Security Alliance (CSA) attempts to provide specific guidance for securing agentic environments. </p><p>It helps:</p><ul><li><p>The identifying characteristics and unique security challenges of agentic systems</p></li><li><p>Why securing agentic systems requires a fundamental shift from a "perimeter defense" mentality to a "Zero Trust, continuous verification" one</p></li><li><p>What a trait-based approach to agentic system design looks like</p></li><li><p>Key traits and patterns, including orchestration, communication, planning, perception and context, agent learning, trust, and tool usage</p></li><li><p>The need for close collaboration between AI practitioners, security professionals, and system architects</p></li></ul><h3><strong><a href="https://labs.zenity.io/p/when-a-jira-ticket-can-steal-your-secrets">AgentFlayer: When a Jira Ticket Can Steal Your Secrets</a></strong></h3><p>Researchers continue to find novel ways to exploit LLMs and agents, with one of the latest examples being dubbed &#8220;AgentFlayer&#8221; by the Zenity team. It involves a zero-click attempt through malicious prompts in Jira tickets, which can cause Cursor to exfiltrate potentially sensitive data from your repositories or local file system. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yqs3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yqs3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 424w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 848w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 1272w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yqs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png" width="1456" height="865" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:865,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:640378,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Yqs3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 424w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 848w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 1272w, https://substackcdn.com/image/fetch/$s_!Yqs3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd6a0a640-5bec-4023-bc69-a0b9d065a1bf_1538x914.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A key part of the attack if Cursor being set to auto-run mode, to avoid manual approvals of tool calls. If this sounds silly, it shouldn&#8217;t, given it is a common configuration of users wanting to avoid prompt approval fatigue. </p><p>What&#8217;s funny in the scenario Zenity used is instead of using the term &#8220;API Keys&#8221;, they used the term &#8220;Apples&#8221; while still functionally having Cursor look for and potentially expose the same thing - e.g. secrets. It shows how the play on words and natural language nature of LLMs just make them inherently challenging to govern from a security perspective, despite the best attempts to build in guardrails. </p><h3><a href="https://thehackernews.com/2025/07/securing-agentic-ai-how-to-protect.html">Securing Agentic AI: How to Protect the Invisible Identity Access</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://thehackernews.com/2025/07/securing-agentic-ai-how-to-protect.html" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-5Sn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 424w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 848w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 1272w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-5Sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png" width="466" height="226.42453987730062" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:815,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:220064,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://thehackernews.com/2025/07/securing-agentic-ai-how-to-protect.html&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-5Sn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 424w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 848w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 1272w, https://substackcdn.com/image/fetch/$s_!-5Sn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15a371c9-aa60-4d12-98ee-70f45055e589_815x396.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Identity and Access Management (IAM) remains a key topic of concern regarding Agentic AI. This piece on The Hacker News by Astrix Field CTO Jonathan Suder discusses the topic, along with how to go about securing agentic identity. </p><p>As he discusses, AI agents redefine identity risk due to:</p><ul><li><p>Autonomy of agents</p></li><li><p>Unpredictable behavior of LLMs</p></li><li><p>The fact that existing IAM tools were built for human users</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EwA9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EwA9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 424w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 848w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 1272w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EwA9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png" width="565" height="320.9705284552846" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ebb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:984,&quot;resizeWidth&quot;:565,&quot;bytes&quot;:116932,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EwA9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 424w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 848w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 1272w, https://substackcdn.com/image/fetch/$s_!EwA9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Febb1313e-ccf1-407d-84c4-ba4e4ddc7410_984x559.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Typical human identity controls can be applied to AI agents as well:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!svd2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!svd2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 424w, https://substackcdn.com/image/fetch/$s_!svd2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 848w, https://substackcdn.com/image/fetch/$s_!svd2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 1272w, https://substackcdn.com/image/fetch/$s_!svd2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!svd2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png" width="944" height="451" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:451,&quot;width&quot;:944,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69307,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!svd2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 424w, https://substackcdn.com/image/fetch/$s_!svd2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 848w, https://substackcdn.com/image/fetch/$s_!svd2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 1272w, https://substackcdn.com/image/fetch/$s_!svd2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3042103e-9b99-47f4-bdab-f84f561790fc_944x451.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Key activities involved in securing AI agent access include:</p><ul><li><p>Discovery and governance</p></li><li><p>Lifecycle management</p></li><li><p>Threat detection &amp; response</p></li></ul><p>Of course, these activities were and still are relevant for securing human users. Still, now agents are poised to exponentially outnumber human users in enterprise environments, massively expanding the attack surface and complexity of managing these risks.</p><p>Astrix Security is a purpose-built platform focused on these risks and is one of the teams leading the charge to secure agents' IAM. </p><h1>AppSec</h1><h3><a href="https://www.nextgov.com/cybersecurity/2025/08/cisa-officials-commit-supporting-top-vulnerability-cataloging-program/407309/?oref=ng-homepage-river">CISA Officials Commit to Supporting CVE Program</a></h3><p>The <strong><a href="https://www.cve.org/">CVE program</a></strong> has been a key point of discussion among the AppSec and broader cyber community over the past year, especially due to the ongoing struggles of the NIST NVD and CVE itself, which have nearly lost funding and support from CISA. However, at a recent Black Hat panel discussion, multiple CISA officials committed to CISA&#8217;s ongoing support of the CVE program.</p><p>They also emphasized the CVE program's critical role in vulnerability management and its centrality to &#8220;all of our cybersecurity operations.&#8221;  </p><h3><a href="https://www.linkedin.com/posts/jgamblin_the-art-of-concealment-talk-slides-activity-7361088882190274562-qrW9?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">CVE&#8217;s Challenge with Transparency</a></h3><p>Speaking of CVEs and the CVE program, I recently shared &#8220;<strong><a href="https://cnascorecard.org/">CNA Scorecard</a></strong>&#8221; from my go-to Vulnerability Researcher, Jerry Gamblin. Jerry also recently shared his BSides slide deck and talk unpacking challenges with transparency around CVEs and their data quality. </p><p>His presentation has some great summaries of key CVE concepts:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PGLy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PGLy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 424w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 848w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 1272w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PGLy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png" width="1374" height="760" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:760,&quot;width&quot;:1374,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:419444,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PGLy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 424w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 848w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 1272w, https://substackcdn.com/image/fetch/$s_!PGLy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb2c744aa-150c-494a-9ace-6cc781a0bb49_1374x760.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This includes what makes a CVE actionable, such as understanding the type of flaw, what products it affects, how severe it is, and how it can be fixed. </p><p>He also has a slide summarizing the crisis around the CVE Program:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oOoG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oOoG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 424w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 848w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 1272w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oOoG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png" width="1354" height="738" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:738,&quot;width&quot;:1354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:515045,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170523828?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oOoG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 424w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 848w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 1272w, https://substackcdn.com/image/fetch/$s_!oOoG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7710ea2-5fe2-4967-95f6-ecfa10c63d7e_1354x738.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The deck has many great insights beyond this, including a proposed path forward out of the mess, so I recommend checking it out in full. </p><h3><a href="https://www.sei.cmu.edu/news/study-finds-key-causes-of-divergence-in-software-bills-of-materials/">SBOM Divergence and Harmonization</a></h3><p>Software Bill of Materials (SBOM) has become a key topic in the broader open source and software supply chain conversation. However, one fundamental challenge and often a key point from detractors or skeptics is the quality and consistency of SBOM outputs from various tools. As they rightly point out, different SBOM tools often produce different SBOM outputs for the same piece of software. </p><p>That is exactly what an effort from the Software Engineering Institute recently found, while also making some recommendations for reconciling or harmonizing these challenges. </p><p>The team produced a <strong><a href="https://github.com/cmu-sei/sbom-plugfest-2024">GitHub repo</a></strong> as part of the SBOM Plugfest, where the results and additional data for those interested are recorded. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[OPERATION FROSTBYTE - Snowflake GOAT]]></title><description><![CDATA[Checking out Varonis' Frostbyte - An Intentionally Misconfigured Snowflake Learning Resource for the Community]]></description><link>https://www.resilientcyber.io/p/operation-frostbyte-snowflake-goat</link><guid isPermaLink="false">https://www.resilientcyber.io/p/operation-frostbyte-snowflake-goat</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Mon, 11 Aug 2025 10:48:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c521ce27-6b3d-43fa-96a9-7362ee2ab384_765x386.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;ve been paying attention to cybersecurity over the past 12 months, you&#8217;ve inevitably heard about the <strong><a href="https://status.snowflake.com/history">Snowflake incident in 2024</a></strong>. It impacted hundreds of Snowflake customers, including big names such as AT&amp;T and Ticketmaster, and involved extortion attempts by those who were impacted.</p><p>The incident involved stolen credentials via an infostealer malware that could be used to access customers&#8217; Snowflake instances. The Varonis Threat Labs team set out to put together some of the most comprehensive and detailed information related to the incident, including helpful diagrams such as the one below:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Resilient Cyber! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1Xld!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Xld!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 424w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 848w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 1272w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Xld!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png" width="1456" height="1166" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1166,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:713921,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1Xld!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 424w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 848w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 1272w, https://substackcdn.com/image/fetch/$s_!1Xld!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97bba377-0981-4087-818e-8d586c9c5f98_1816x1454.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!saEr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!saEr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 424w, https://substackcdn.com/image/fetch/$s_!saEr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 848w, https://substackcdn.com/image/fetch/$s_!saEr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 1272w, https://substackcdn.com/image/fetch/$s_!saEr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!saEr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png" width="1456" height="652" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:465392,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!saEr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 424w, https://substackcdn.com/image/fetch/$s_!saEr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 848w, https://substackcdn.com/image/fetch/$s_!saEr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 1272w, https://substackcdn.com/image/fetch/$s_!saEr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa020d7fd-30fd-4c3e-ae48-473a9cf623a5_1786x800.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Mandiant stated the stolen credentials dated as far back as 2020 and allowed the threat actors to gain access to the affected customer accounts and even export significant amounts of customer data from the impacted customer Snowflake instances, which led to subsequent extortion attempts, threatening to sell the data to cybercriminals etc.</p><p>The incident also led to much discussion among the community about the fundamental shared responsibility in the cloud, including for SaaS providers and customers, and the importance of safe configurations and security controls within their instances of SaaS environments. </p><p>To say SaaS configurations, including those of leading platforms and providers such as Snowflake, are complex would be putting it lightly. That&#8217;s why it&#8217;s awesome to see industry leader Varonis launch <strong><a href="https://www.varonis.com/blog/snowflake-goat">Operation Frostbyte&#8212;the first Snowflake GOAT</a></strong>. In this intentionally misconfigured environment, practitioners can tinker, test, and learn how to properly secure their Snowflake environments and keep sensitive data safe. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qXGl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qXGl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 424w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 848w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 1272w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qXGl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png" width="765" height="386" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:386,&quot;width&quot;:765,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:264204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qXGl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 424w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 848w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 1272w, https://substackcdn.com/image/fetch/$s_!qXGl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb67c4c92-bd43-4a9c-b3eb-64a0db569ec1_765x386.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s often said that bank robbers target banks because that&#8217;s where the money is, and it can be said that malicious actors target platforms such as Snowflake, where the enterprise data is. This may be sensitive information such as PII/PHI, financial information, enterprise credentials, and even security data for use cases like security data lakes. </p><h2>How Varonis approached building Snowflake GOAT</h2><p>There are various intentionally vulnerable technologies, products, and environments out there as the security industry realizes how proper a lab environment can be for educating security practitioners and offering them an opportunity to get hands-on. </p><p>The Varonis team set out to build realistic attack paths and scenarios, such as excessive permissions that can allow privilege escalation and potential lateral movement into other sensitive data. They built Snowflake GOAT with practitioners in mind, whether it is red teams looking to sharpen their saw, defenders looking to better understand the potential risks of their enterprise Snowflake implementations, or others. It offers opportunities for both offensive and defensive cyber operators. </p><p>They are even hosting a DEF CON workshop to empower the community to kick the tires, hosting a capture the flag (CTF) event where folks can play along, have fun, and see how they fare with exploiting the Snowflake implementations. </p><h2>Getting Going</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!idDi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!idDi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 424w, https://substackcdn.com/image/fetch/$s_!idDi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 848w, https://substackcdn.com/image/fetch/$s_!idDi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 1272w, https://substackcdn.com/image/fetch/$s_!idDi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!idDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png" width="518" height="304.035216434336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1363,&quot;resizeWidth&quot;:518,&quot;bytes&quot;:1858277,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!idDi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 424w, https://substackcdn.com/image/fetch/$s_!idDi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 848w, https://substackcdn.com/image/fetch/$s_!idDi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 1272w, https://substackcdn.com/image/fetch/$s_!idDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b3fe1e4-ad9f-40af-a256-d8d029276d7b_1363x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Varonis took a fun approach as well, with a video game-themed implementation. They also leaned into the mantra of open source. Rather than hosting the game in a central location everyone must use, they provide the code via open source, allowing folks to download the data, scripts, and clues they need to participate in Snowflake GOAT.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2uVE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2uVE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 424w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 848w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 1272w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2uVE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png" width="1254" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:1254,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1350602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2uVE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 424w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 848w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 1272w, https://substackcdn.com/image/fetch/$s_!2uVE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc27f91a9-fd7d-4a41-a56e-4d9391512687_1254x618.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A users environments are provisioned via Terraform, making them declarative and repeatable, with users able to both quickly stand up and tear down testing and learning environments of the intentionally misconfigured Snowflake implementation. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rxq0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rxq0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 424w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 848w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 1272w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rxq0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png" width="549" height="513" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:513,&quot;width&quot;:549,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66438,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rxq0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 424w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 848w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 1272w, https://substackcdn.com/image/fetch/$s_!rxq0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0c1310c-82d9-4c14-979a-e3f36ab616b0_549x513.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You also have an opportunity to get hands-on with the data in Snowflake, given it is the core value of the Snowflake platform and generally what attackers are after, and what defenders need to prevent against. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Ji-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Ji-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 424w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 848w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 1272w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Ji-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png" width="1094" height="730" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:730,&quot;width&quot;:1094,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:348401,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168021399?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8Ji-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 424w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 848w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 1272w, https://substackcdn.com/image/fetch/$s_!8Ji-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2a67134-954b-4c53-ad02-f0deb34fbdb9_1094x730.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Organizations can download the code and spin up a vulnerable/misconfigured Snowflake instance to easily test, learn, and develop defensive capabilities for their Snowflake instances. </p><p>This represents an awesome resource for the community. It lets both defenders and offensive security practitioners use it, provide feedback, and even develop different scenarios to prevent future Snowflake incidents. </p><p>So dive in, roll your sleeves up, get your hands dirty, and learn how to protect your organizations from risks associated with Snowflake today!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.varonis.com/frostbyte&quot;,&quot;text&quot;:&quot;Check Out Operation Frostbyte&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.varonis.com/frostbyte"><span>Check Out Operation Frostbyte</span></a></p><p></p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Resilient Cyber! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #59]]></title><description><![CDATA[SentinelOne > Prompt Security, 20 Years of Cyber Consolidation, AI SOC Market Landscape, Agentic AI Security and Governance, CNA Scorecard, Secure AI Coding Assistants (TCO) & State of Exploitation]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-59</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-59</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 07 Aug 2025 20:20:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rZg3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to Issue #59 of the Resilient Cyber Newsletter. </p><p>It&#8217;s Black Hat/Hacker Summer Camp week and the news cycle is in full effect, from product launches, publications, M&amp;A and more. </p><p>I hope you enjoy the resources this week!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rZg3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rZg3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 424w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 848w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 1272w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rZg3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png" width="511" height="367.40253164556964" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:568,&quot;width&quot;:790,&quot;resizeWidth&quot;:511,&quot;bytes&quot;:760395,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rZg3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 424w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 848w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 1272w, https://substackcdn.com/image/fetch/$s_!rZg3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa86a900a-7a67-48eb-8456-a69e03ef42ce_790x568.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity</strong>.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mR1f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mR1f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 424w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 848w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 1272w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mR1f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png" width="322" height="113.78506375227687" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:388,&quot;width&quot;:1098,&quot;resizeWidth&quot;:322,&quot;bytes&quot;:13279,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mR1f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 424w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 848w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 1272w, https://substackcdn.com/image/fetch/$s_!mR1f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cbbe0ee-40b6-4de4-9a01-08526eaab51d_1098x388.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>AI Agents That Triage Vulnerabilities for You</h3><p>Vulnerability management is broken - bloated backlogs, endless false positives, and constant pressure. Maze changes that. Our AI agents autonomously triage and resolve cloud CVE findings, cutting out the noise so your team focuses on what truly matters.<br><br>Think of it as having expert security engineers on demand: contextual, precise, and always on. Faster fixes, fewer escalations, and finally, a backlog you can get ahead of.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://mazehq.com/blog/launching-maze-ai-agents-for-vulnerability-management?utm_source=resilient-cyber&amp;utm_medium=newsletter-ad&amp;utm_campaign=newsletter&amp;utm_content=ai-agents-that-triage-vulnerabilities&quot;,&quot;text&quot;:&quot;Find Out How It Works&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://mazehq.com/blog/launching-maze-ai-agents-for-vulnerability-management?utm_source=resilient-cyber&amp;utm_medium=newsletter-ad&amp;utm_campaign=newsletter&amp;utm_content=ai-agents-that-triage-vulnerabilities"><span>Find Out How It Works</span></a></p></blockquote><div><hr></div><h1>Cybersecurity Leadership &amp; Market Dynamics</h1><h3><a href="https://www.resilientcyber.io/p/resilient-cyber-w-sid-trivedi-black">Resilient Cyber w/ Sid Trivedi - Black Hat, Cyber and AI Opportunities</a></h3><p>In this episode, we sit down with Sid Trivedi, Partner at venture capital firm <strong><a href="https://foundationcapital.com/">Foundation Capital</a></strong> and host of the Inside the Network podcast.</p><p>Sid brings great insights around cybersecurity market trends, industry events such as Black Hat, and the impact that AI is having on the startup and venture capital ecosystem.</p><p>We discussed:</p><ul><li><p>His team at <strong><a href="https://foundationcapital.com/">Foundation Capital</a></strong>, where and how they invest, and how they identify opportunities.</p></li><li><p>Black Hat (Hacker Summer Camp) and the <strong><a href="https://www.blackhat.com/us-25/spotlight.html">Startup Spotlight Competition</a></strong>: how they work, what teams are involved, and the benefits for the cyber and venture capital community.</p></li><li><p>Other Black Hat events include the Innovators and Investors summit and what they help facilitate.</p></li><li><p>M&amp;A Headlines, from Palo Alto Networks (PANW) acquiring CyberArk to other rumors such as Datadog and Upwind, and what we&#8217;re seeing play out in the cyber industry related to platforms vs. best of breed.</p></li><li><p>How innovative startups can stand out and why a few players will never dominate the cyber ecosystem due to the countless niches, evolving threats, and changing technologies involved.</p></li><li><p>The impact of AI on the venture capital and investment landscape and what opportunities there are for AI when it comes to cybersecurity, both for attackers and defenders</p></li><li><p>The concept of Services-as-a-Software and the opportunity and Total Addressable Market (TAM) for labor and services work typically associated with software and why it is such an enticing opportunity for both founders and investors.</p></li><li><p>Sid&#8217;s podcast, &#8220;<strong><a href="https://insidethenetwork.co/">Inside the Network</a></strong>,&#8221; interviews industry leaders who have built defining companies, sharing their hard lessons, wisdom, and insights with the community.</p><div id="youtube2-Ra3fWIWMLvc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ra3fWIWMLvc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ra3fWIWMLvc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><h3><a href="https://www.linkedin.com/pulse/intent-over-tactics-cisos-guide-protecting-your-crown-caleb-sima-5oa9c/">Intent Over Tactics: A CISO&#8217;s Guide to Protecting Your Crown Jewels</a> </h3><p>The role of the CISO inevitably can feel overwhelming. Never-ending threats, new technologies, business goals, churn among your team, tool overload, budget constraints, etc.</p><p>This piece from longtime industry leader Caleb Sima helps hone in on what matters most. He phrased it as &#8220;a practice guide to protecting your most critical assets when budget, headcount, and political capital are tight.&#8221; </p><p>Caleb discusses constraints nearly all security leaders grapple with, such as:</p><ul><li><p>A large and complex attack surface</p></li><li><p>Limited resources</p></li><li><p>Inevitability of breach</p></li></ul><p>He lays out an approach leaders can take to protecting their organizations' crown jewels, which includes identifying them, finding them, and securing them using a threat assessment approach.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rUqp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rUqp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 424w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 848w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 1272w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rUqp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png" width="533" height="305.03799019607845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:467,&quot;width&quot;:816,&quot;resizeWidth&quot;:533,&quot;bytes&quot;:99411,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rUqp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 424w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 848w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 1272w, https://substackcdn.com/image/fetch/$s_!rUqp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda46bf47-f32b-495a-aeb7-fc0401c96c18_816x467.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.sentinelone.com/press/sentinelone-to-acquire-prompt-security-to-advance-genai-security/">SentinelOne to Acquire Prompt Security</a></h3><p>Another major GenAI Security acquisition is underway. This time, SentinelOne is acquiring Prompt Security in efforts to advance GenAI and Agentic AI security. This comes on the heels of Palo Alto Networks' (PANW) <strong><a href="https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-completes-acquisition-of-protect-ai">prior announcement</a></strong> to acquire Protect AI, which was announced during RSA, with the SentinelOne announcement coinciding with Black Hat. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SDNL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SDNL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 424w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 848w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 1272w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png" width="1187" height="327" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:327,&quot;width&quot;:1187,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:201144,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SDNL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 424w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 848w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 1272w, https://substackcdn.com/image/fetch/$s_!SDNL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54bcab62-dbc2-4535-8811-e8387473c019_1187x327.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This aligns with broader industry discussions and rumors about industry leaders racing to keep pace with the rise of GenAI and Agentic AI, ensuring their platforms and products stay relevant and position themselves as leaders regarding AI security. </p><h3><a href="https://www.calcalistech.com/ctechnews/article/bjt0500luxl">M&amp;A Spotlight Shifts to Lasso, Aim, and Pillar after SentinelOne&#8217;s $250M Prompt Dea</a>l</h3><p>Following the acquisitions of Protect AI and Prompt, M&amp;A attention is turning to the remaining innovative startups focused on AI Security, such as Lasso, Aim, and Pillar Security. </p><p>This piece from CTech states that the above firms have already received acquisition offers from industry leaders such as Check Point, ZScaler, and F5. It will be interesting to see if the above firms or similar companies become the next in the string of AI Security acquisitions as industry leaders race to position themselves at the forefront of securing enterprise AI adoption.</p><h3><a href="https://ventureinsecurity.net/p/20-years-of-cybersecurity-consolidation">20 Years of Cyber Consolidation: How 200 Companies Became 11</a></h3><p>Over the past couple of years, we&#8217;ve heard a lot of discussion around platformization and consolidation in the cyber industry. But what does that actually look like? This excellent piece from my friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;65912264-46ad-4cf8-8b59-446e5ce8e888&quot;}" data-component-name="MentionToDOM"></span> thoroughly lays out how 200 cybersecurity companies became 11 industry giants.</p><p>Ross draws parallels to the U.S. Department of Defense (DoD) Government Contracting ecosystem and discusses the four stages of industry consolidation and the factors that drive it.</p><p>This is a great read for folks looking to understand the cyber ecosystem and its key players' past, present, and future.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qqxk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qqxk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 424w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 848w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 1272w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qqxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png" width="942" height="696" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:696,&quot;width&quot;:942,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:262189,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qqxk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 424w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 848w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 1272w, https://substackcdn.com/image/fetch/$s_!qqxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550b9905-fc27-4055-a910-8d4a3bfda023_942x696.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.nextgov.com/cybersecurity/2025/08/former-and-current-officials-clash-over-cisas-role-us-cyber-defenses-black-hat/407260/?oref=ng-homepage-river">Former and Current Officials Clash Over CISA&#8217;s Role in U.S. Cyber Defenses at Black Hat</a></h3><p>In a rare occurrence, former and current Government officials associated with CISA and the NSA publicly demonstrated a difference of opinion during a recent event related to Black Hat. </p><p>It involved CISA&#8217;s Communications Chief and former NSA Leader Rob Joyce. The difference of opinion was focused on the impact of scaling back the federal cyber workforce. The CISA official focused on refocusing CISA on its core mission as part of the workforce reductions, while industry security leader Rob Joyce stressed the impact it will have on the Federal cybersecurity landscape, arguing it sets the ecosystem back in terms of security, when it was already struggling</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QVLE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QVLE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 424w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 848w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 1272w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QVLE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png" width="1029" height="676" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b03a8637-229b-45f0-aa44-ff674099e192_1029x676.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:676,&quot;width&quot;:1029,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:815512,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QVLE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 424w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 848w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 1272w, https://substackcdn.com/image/fetch/$s_!QVLE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb03a8637-229b-45f0-aa44-ff674099e192_1029x676.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://www.lasso.security/blog/identitymesh-exploiting-agentic-ai">IdentityMesh: Exploiting Lateral Movement in Agentic Systems</a></h3><p>As we continue to see the rising adoption and excitement around agents, many are beginning to explore how they can be exploited and the implications for organizations. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-r_i!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-r_i!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 424w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 848w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 1272w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-r_i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png" width="590" height="342.46722288438616" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dabcc325-b8af-41a4-994f-56c03953bc31_839x487.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:487,&quot;width&quot;:839,&quot;resizeWidth&quot;:590,&quot;bytes&quot;:160898,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-r_i!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 424w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 848w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 1272w, https://substackcdn.com/image/fetch/$s_!-r_i!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdabcc325-b8af-41a4-994f-56c03953bc31_839x487.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This latest piece from AI security leader Lasso explores how agents can be exploited to move laterally across environments and systems. It demonstrates how malicious content can be read by an agent and then subsequently acted upon through later operations on other systems that the agent interfaces with.</p><p>Lasso explains how, through AI agents' unified operational identity, attackers can leverage indirect prompt injection and the unchecked flow of information across traditionally isolated identities to propagate malicious actions across various system boundaries. </p><p>Some example scenarios:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XtYE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XtYE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 424w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 848w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 1272w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XtYE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png" width="763" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:458,&quot;width&quot;:763,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:82688,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XtYE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 424w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 848w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 1272w, https://substackcdn.com/image/fetch/$s_!XtYE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a0fe54f-3ea6-43ff-ba68-01edeeea8d6c_763x458.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!61lt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!61lt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 424w, https://substackcdn.com/image/fetch/$s_!61lt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 848w, https://substackcdn.com/image/fetch/$s_!61lt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 1272w, https://substackcdn.com/image/fetch/$s_!61lt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!61lt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png" width="739" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:739,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:56338,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!61lt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 424w, https://substackcdn.com/image/fetch/$s_!61lt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 848w, https://substackcdn.com/image/fetch/$s_!61lt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 1272w, https://substackcdn.com/image/fetch/$s_!61lt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2da04ea2-e880-4e43-8bc7-ebf65032ffa6_739x450.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://softwareanalyst.substack.com/p/sacr-ai-soc-market-landscape-for">AI SOC Market Landscape for 2025</a></h3><p>One of the areas seeing the most interest within Cybersecurity for AI use is arguably SecOps, based on the number of startups and venture capital allocation. But trying to understand the AI SOC market landscape can be difficult with so many different players, capabilities, and more to make sense of. </p><p>This piece from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Francis Odum&quot;,&quot;id&quot;:6770950,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e1abfe3b-34cf-49c6-af16-c3961bb40c4f_512x512.jpeg&quot;,&quot;uuid&quot;:&quot;bba0d3dc-0932-4ce7-b003-c7bba943180b&quot;}" data-component-name="MentionToDOM"></span> does a great job of framing the current AI SOC landscape, including the various players, trends, and more. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!B56E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!B56E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 424w, https://substackcdn.com/image/fetch/$s_!B56E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 848w, https://substackcdn.com/image/fetch/$s_!B56E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 1272w, https://substackcdn.com/image/fetch/$s_!B56E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!B56E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png" width="572" height="360.6637168141593" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa9cd697-a6d7-481d-a87a-00f541768182_904x570.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:570,&quot;width&quot;:904,&quot;resizeWidth&quot;:572,&quot;bytes&quot;:362325,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!B56E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 424w, https://substackcdn.com/image/fetch/$s_!B56E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 848w, https://substackcdn.com/image/fetch/$s_!B56E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 1272w, https://substackcdn.com/image/fetch/$s_!B56E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa9cd697-a6d7-481d-a87a-00f541768182_904x570.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EgSt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EgSt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 424w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 848w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 1272w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EgSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png" width="586" height="324.1840354767184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:499,&quot;width&quot;:902,&quot;resizeWidth&quot;:586,&quot;bytes&quot;:405206,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EgSt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 424w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 848w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 1272w, https://substackcdn.com/image/fetch/$s_!EgSt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f195c4-36dd-48e6-9858-66e09ca16100_902x499.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://genai.owasp.org/resource/state-of-agentic-ai-security-and-governance-1-0/">State of Agentic AI Security and Governance</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KuHd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KuHd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 424w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 848w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 1272w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KuHd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png" width="275" height="375.84973166368513" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:764,&quot;width&quot;:559,&quot;resizeWidth&quot;:275,&quot;bytes&quot;:87870,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KuHd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 424w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 848w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 1272w, https://substackcdn.com/image/fetch/$s_!KuHd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0b0b5ed-edd1-43d3-a7c2-cd08bfcf7b1b_559x764.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One key theme missing from many conversations about the excitement and adoption of Agentic AI is Security and Governance. IBM's latest Cost of a Data Breach Report evidenced this, finding that the majority of organizations lacked policies and processes to govern Agentic AI (and AI more broadly).<br><br>That's why this publication from <strong><a href="https://www.linkedin.com/company/owasp-top-10-for-large-language-model-applications/">OWASP GenAI Security Project</a></strong> is timely. It covers the State of Agentic AI Security and Governance, including:</p><ul><li><p>A taxonomy for agents and their various use cases</p></li><li><p>Agent frameworks and the protocol landscape, for interacting with tools, communication between agents and taking actions</p></li><li><p>Threats and Mitigations for various risks associated with Agentic AI</p></li><li><p>A look at both the regulatory and compliance landscape, as well as future trends and emerging requirements for Agentic AI</p><p><br>Another excellent publication by the <strong><a href="https://www.linkedin.com/company/owasp/">OWASP&#174; Foundation</a></strong> team, on a key topic as Agentic AI adoption and exploration heats up!</p></li></ul><h1>AppSec, Vulnerability Management, and Software Supply Chain Security</h1><h3><a href="https://cnascorecard.org/">CNA Scorecard</a></h3><p>As most of us know, the vulnerability database and scoring ecosystem is a complete mess. From the near collapse and continued struggles of the NIST NVD to the continued irrelevance of CVSS for prioritization, organizations are drowning in CVEs, and more. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WBUR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WBUR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 424w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 848w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 1272w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WBUR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png" width="1286" height="210" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:210,&quot;width&quot;:1286,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WBUR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 424w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 848w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 1272w, https://substackcdn.com/image/fetch/$s_!WBUR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdafaa44b-8a1c-4f2d-ad43-b1b7ac0b2cda_1286x210.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This new resource from Jerry Gambling presents a CNA Scorecard and looks to track CVE Data Completeness. Let&#8217;s say the figures aren&#8217;t pretty.</p><p>As he points out, only 2% of CVEs have CPE data, and only 5% have patching information. This hinders automation and leaves security teams in the dark about how to mitigate risks best. </p><p>Jerry defines 5 key categories for CVE Data Completeness, as identified below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PzWA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PzWA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 424w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 848w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 1272w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PzWA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png" width="1456" height="872" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6606c88-4115-49d2-b173-f1c537476a99_1509x904.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:872,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197665,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PzWA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 424w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 848w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 1272w, https://substackcdn.com/image/fetch/$s_!PzWA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6606c88-4115-49d2-b173-f1c537476a99_1509x904.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The figures speak for themselves and demonstrate the challenges downstream security teams face when understanding what software CVEs apply to or what relevant patches, fixes, and mitigations are.</p><h3><a href="https://www.anthropic.com/news/automate-security-reviews-with-claude-code">Automate Security Reviews with Claude Code</a></h3><p>One interesting development in the industry is the rising number of AI development platforms looking to add security capabilities natively. While many AppSec vendors are accustomed to filling gaps on native development platforms, cloud environments, etc., the introduction of capabilities focused on AppSec directly by the development platforms poses a challenge.</p><p>One such example is Claude Code's recent addition of code security review. They&#8217;re doing this via a GitHub Actions integration and the use of the<code>/security-review</code> command. The Claude team released a video showing how it works:</p><div id="youtube2-YdiCjgYGKto" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;YdiCjgYGKto&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/YdiCjgYGKto?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>The Claude team states that it can help identify vulnerabilities such as:</p><ul><li><p>SQL Injection</p></li><li><p>XSS</p></li><li><p>Authentication and Authorization Flaws</p></li><li><p>Insecure Data Handling</p></li><li><p>Dependency Vulnerabilities</p></li></ul><p>This can be used to automate security reviews for new PR&#8217;s. </p><p>What will be interesting to see evolve is the token cost associated with usage of this capability, as well as how it impacts broader AppSec companies offering a similar capability and integrating with workflows associated with some of the leading AI coding platforms. </p><h3><a href="https://www.endorlabs.com/learn/securing-the-roi-of-ai-coding-assistants-a-total-cost-analysis">Securing AI Coding Assistants: A Total Cost Analysis</a></h3><p>We know that coding assistants such as copilots and LLM development are seeing rapid adoption across the entire landscape. But what does it take to secure their use, and what is the total cost analysis of their usage?</p><p>As this piece from Endor Labs points out, teams are seeing 10-40% increases in code velocity because studies are finding that 62% of AI-generated code is also insecure by default, and developers using AI coding assistants are twice as likely to write insecure code. </p><p>Endor discusses how AI-generated code suffers from the same types of weaknesses as broader open source code, which makes sense given that the leading models are trained on large open source datasets. However, traditional SAST tools aren&#8217;t poised to meet some of the deeper design flaws and risks that AI code can introduce, either. </p><p>As Endor points out, manual code review wasn&#8217;t already scalable for a team with a few thousand developers, let alone their increased 10-40% improved code velocity and volume. Endor provides some helpful metrics to show the cost of code review with typical scenarios:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qywi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qywi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 424w, https://substackcdn.com/image/fetch/$s_!qywi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 848w, https://substackcdn.com/image/fetch/$s_!qywi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 1272w, https://substackcdn.com/image/fetch/$s_!qywi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qywi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png" width="992" height="379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:379,&quot;width&quot;:992,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42215,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qywi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 424w, https://substackcdn.com/image/fetch/$s_!qywi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 848w, https://substackcdn.com/image/fetch/$s_!qywi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 1272w, https://substackcdn.com/image/fetch/$s_!qywi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f698642-c0d6-412c-a2c7-84efee2c3408_992x379.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kgqv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kgqv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 424w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 848w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 1272w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kgqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png" width="985" height="424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/275fef53-3e4d-4869-9951-f30e512fec33_985x424.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:424,&quot;width&quot;:985,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58203,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kgqv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 424w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 848w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 1272w, https://substackcdn.com/image/fetch/$s_!Kgqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F275fef53-3e4d-4869-9951-f30e512fec33_985x424.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Endor is one of the AppSec organizations pioneering the use of Agentic AI for AppSec use cases, such as multiple agent personas to do security reviews of PR&#8217;s, classify risk, prioritize issues, and more. They lay out some of the metrics below based on the use of AI Security Code Review, which is saving thousands of hours annually: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cTtA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cTtA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 424w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 848w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 1272w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cTtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png" width="1010" height="426" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c78d8405-b919-4610-beeb-36f218780d71_1010x426.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:426,&quot;width&quot;:1010,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73383,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cTtA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 424w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 848w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 1272w, https://substackcdn.com/image/fetch/$s_!cTtA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc78d8405-b919-4610-beeb-36f218780d71_1010x426.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I dove deep into Endor Lab&#8217;s CEO, Varun Badhwar, on these topics on an episode of Resilient Cyber titled &#8220;<strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-varun-badhwar-ai">AI for AppSec - Beyond the Buzzwords</a></strong>&#8221;:</p><div id="youtube2-r8woWT0ax-E" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;r8woWT0ax-E&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/r8woWT0ax-E?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://www.vulncheck.com/blog/state-of-exploitation-1h-2025/">State of Exploitation - A Look into the 1H - 2025 Vulnerability Exploitation &amp; Threat Activity</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vHL8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vHL8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 424w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 848w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 1272w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vHL8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png" width="959" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1caa542-5729-4b25-828b-f031afa98ac3_959x532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:959,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:209618,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/170270991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vHL8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 424w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 848w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 1272w, https://substackcdn.com/image/fetch/$s_!vHL8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1caa542-5729-4b25-828b-f031afa98ac3_959x532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s always good to reflect back on the state of vulnerability exploitation to understand key themes and trends. This piece from my friend Patrick Garrity over at VulnCheck provides exactly those insights along with some great visualizations.</p><p>They identified:</p><ul><li><p>432 CVE&#8217;s that were being reported as being exploited for the first time</p></li><li><p>32.1% of KEVs had exploitation evidence on or before the day the CVE was issued, an increase from 23.6% in 2024.</p></li><li><p>Reported exploitation attributed to threat actors in China and North Korea decreased while exploitation attributed to Russia and Iran threat actors increased.</p></li><li><p>26.9% of KEVs first seen in the 1H-2025 were still awaiting analysis by NIST</p></li><li><p>While Open Source Software is impacted by a growing number of exploited vulnerabilities, our research shows that proprietary software such as CMS platforms and plug-ins, network edge devices, and server software are larger contributors to mass exploitation - not necessarily open source software.</p></li><li><p>147 of 181 unique CVEs that were used by known threat actors had evidence of exploitation prior to 2025, demonstrating that threat actor exploitation disclosure often lags behind disclosure of initial exploitation evidence.</p></li></ul><p>Some really interesting insights here to call out, such as the fact that 32% of KEV&#8217;s are zero days with evidence of exploitation before a CVE is even issued, and the ongoing struggles of the NIST National Vulnerability Database (NVD) when it comes to analysis. Lastly, despite all the hype and focus on open source in the context of software supply chain security, proprietary software vendors and products are still the primary attack vector impacting the ecosystem. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[AI Adoption: Seatbelts, Air Bags & Oversight Optional ]]></title><description><![CDATA[A look at IBMs 2025 Cost of a Data Breach Report: The AI Oversight Gap]]></description><link>https://www.resilientcyber.io/p/ai-adoption-seatbelts-air-bags-and</link><guid isPermaLink="false">https://www.resilientcyber.io/p/ai-adoption-seatbelts-air-bags-and</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Tue, 05 Aug 2025 18:57:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CF5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Everywhere we look, organizations are racing to adopt AI, LLM&#8217;s, Agents and more. AI has dominated the venture capital allocation, startup ecosystem and discussions among business and technology leaders. </p><p>Want to know what&#8217;s alarmingly absent from those conversations?</p><blockquote><p><strong>Oversight. </strong></p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CF5b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CF5b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 424w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 848w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 1272w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CF5b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png" width="472" height="466.7262569832402" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/512be147-cbc8-4794-9043-44334e88d3bd_716x708.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:708,&quot;width&quot;:716,&quot;resizeWidth&quot;:472,&quot;bytes&quot;:1162357,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CF5b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 424w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 848w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 1272w, https://substackcdn.com/image/fetch/$s_!CF5b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F512be147-cbc8-4794-9043-44334e88d3bd_716x708.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At least that is the key theme of the latest <strong><a href="https://www.ibm.com/reports/data-breach">IBM Cost of a Data Breach Report (2025</a></strong>). </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MfFP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MfFP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 424w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 848w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 1272w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MfFP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png" width="419" height="425.25373134328356" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:612,&quot;width&quot;:603,&quot;resizeWidth&quot;:419,&quot;bytes&quot;:493297,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MfFP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 424w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 848w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 1272w, https://substackcdn.com/image/fetch/$s_!MfFP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeb035ab-ec11-4b87-9534-950bfd764a4e_603x612.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity</strong>.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><p>While the report covers a variety of topics, I&#8217;ll be sticking with the reports theme and focusing on some of the findings that are AI-specific. Below are the key findings summarized by the report:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!07kB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!07kB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 424w, https://substackcdn.com/image/fetch/$s_!07kB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 848w, https://substackcdn.com/image/fetch/$s_!07kB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 1272w, https://substackcdn.com/image/fetch/$s_!07kB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!07kB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png" width="725" height="420.1842546063652" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:1194,&quot;resizeWidth&quot;:725,&quot;bytes&quot;:263679,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!07kB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 424w, https://substackcdn.com/image/fetch/$s_!07kB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 848w, https://substackcdn.com/image/fetch/$s_!07kB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 1272w, https://substackcdn.com/image/fetch/$s_!07kB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4bf4eb9-574b-4a7c-a690-5cd9b32477fb_1194x692.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One interesting stat from the report is that the average cost of a data breach fell globally, but broke a record in the U.S., with the average reaching $10.22 <em><strong>million, a 9% increase from the year prior</strong></em>. The report states this figure is driven by increased regulatory fines as well as higher detection and escalation costs. </p><p>I thought this was a bit ironic of a statement, given we&#8217;re seeing the U.S. openly embrace a push for deregulation, while other regions such as the U.S. are seeking to increase regulation, especially around areas such as AI and Cybersecurity. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dARq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dARq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 424w, https://substackcdn.com/image/fetch/$s_!dARq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 848w, https://substackcdn.com/image/fetch/$s_!dARq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 1272w, https://substackcdn.com/image/fetch/$s_!dARq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dARq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png" width="464" height="395" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:395,&quot;width&quot;:464,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:30853,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dARq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 424w, https://substackcdn.com/image/fetch/$s_!dARq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 848w, https://substackcdn.com/image/fetch/$s_!dARq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 1272w, https://substackcdn.com/image/fetch/$s_!dARq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad9f19bc-6c57-4e5d-b1e6-58b6781526c3_464x395.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report goes into much more detail for specific industry verticals and so on, but I again want to focus on the reports theme, which is a neglect of oversight related to AI as well as claims of reduced incident costs, as teams embrace AI from the defenders perspective. </p><p>Before we jump right to that though, there are a few painful things to call out, despite the global decrease in incident costs (not you U.S.!), it is taking several hundreds of days to identify and contain data breaches across various environments, whether they are cloud-native, hybrid or even on-prem. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wDJ8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wDJ8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 424w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 848w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 1272w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wDJ8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png" width="386" height="415.49781659388645" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:493,&quot;width&quot;:458,&quot;resizeWidth&quot;:386,&quot;bytes&quot;:31130,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wDJ8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 424w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 848w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 1272w, https://substackcdn.com/image/fetch/$s_!wDJ8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F073298d8-92fa-4cdc-b8e3-86d321c79995_458x493.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The most costly attacks include third-party vendor and supply chain compromises and phishing, as well as malicious insiders, although those were not as common.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!86CY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!86CY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 424w, https://substackcdn.com/image/fetch/$s_!86CY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 848w, https://substackcdn.com/image/fetch/$s_!86CY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 1272w, https://substackcdn.com/image/fetch/$s_!86CY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!86CY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png" width="876" height="482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:482,&quot;width&quot;:876,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:50421,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!86CY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 424w, https://substackcdn.com/image/fetch/$s_!86CY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 848w, https://substackcdn.com/image/fetch/$s_!86CY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 1272w, https://substackcdn.com/image/fetch/$s_!86CY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9e46ab9a-733d-46c1-93be-3f8f851adae6_876x482.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Those same attack vectors also took the longest to identify and resolve: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!26ZW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!26ZW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 424w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 848w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 1272w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!26ZW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png" width="405" height="577" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:577,&quot;width&quot;:405,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:42095,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!26ZW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 424w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 848w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 1272w, https://substackcdn.com/image/fetch/$s_!26ZW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e098deb-0552-4c1c-8fad-e65279d04ac4_405x577.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One great thing to highlight is that organizational security teams <em><strong>are</strong></em> getting better are incident and breach identification, versus finding out from a third party or the attacker themselves:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_wfZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_wfZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 424w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 848w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 1272w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_wfZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png" width="401" height="349" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:349,&quot;width&quot;:401,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:20468,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_wfZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 424w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 848w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 1272w, https://substackcdn.com/image/fetch/$s_!_wfZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40dfc365-1cb6-4755-b6c5-d01c209f088f_401x349.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This seems to support the always elusive Return on Security Investment (ROSI) metric that many security leaders struggle with when demonstrating value to the business.</p><h2>AI Oversight - Not Even Once</h2><p>Now, for the report's concerning part and key theme, The report specifically calls out shadow AI and states that AI security is lacking. </p><blockquote><p><strong>They found that 97% of organizations that had an AI-related incident involving their models or applications lacked proper AI access control. </strong></p></blockquote><p>Among those incidents, the leading incident type was supply chain-related (e.g., external apps, APIs, and plugins), and these led to operation disruption and unauthorized access to sensitive data 31% of the time. </p><p>This aligns with <strong><a href="https://www.harmonic.security/blog-posts/genai-data-exposure-report-fa6wt">similar findings</a></strong>, which found that nearly 22% of <em><strong>all</strong></em> uploaded files and almost 5% of <em><strong>all</strong></em> prompts included sensitive data, often involving GenAI tools previously unknown to the organization to even be in use, let alone authorized for use. </p><p>These findings from the IBM report also emphasize how quickly AI has been integrated into organizational workflows and the software, products, and services organizations are using, given that it often leads to operational disruptions. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Dhh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Dhh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 424w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 848w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 1272w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Dhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png" width="890" height="554" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:554,&quot;width&quot;:890,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:98092,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8Dhh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 424w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 848w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 1272w, https://substackcdn.com/image/fetch/$s_!8Dhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F10d7ef98-e4cf-429c-b226-26ec0d4ce6ad_890x554.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In terms of the type of AI systems involved in the incidents, 29% were external third-party vendors, while 26% were trained in-house. This shows that organizations aren&#8217;t just using external AI vendors but also routinely trying to train models in-house. They need to be responsible for their secure hosting and usage. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1AKe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1AKe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 424w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 848w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 1272w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1AKe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png" width="672" height="578" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:578,&quot;width&quot;:672,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59516,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1AKe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 424w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 848w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 1272w, https://substackcdn.com/image/fetch/$s_!1AKe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7817699c-b3ad-440f-9424-11e6614cc7f8_672x578.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To further emphasize how prevalent shadow AI usage is, the report highlights that unsanctioned AI security incidents are more common than sanctioned AI incidents. Shadow AI was involved in 20% of the breaches, where only 13% of the incidents involved AI usage the organization was already aware of. Most concerning of all though is the fact that:</p><blockquote><p><br><strong>&#8221;A further 11% of breached organizations were unsure if they experienced a shadow AI incident.&#8221;</strong></p></blockquote><p>Organizations literally have poor visibility into their AI consumption, echoing early days of Cloud and SaaS prior (which are still problems)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DCXH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DCXH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 424w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 848w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 1272w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DCXH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png" width="576" height="490.47043363994743" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:648,&quot;width&quot;:761,&quot;resizeWidth&quot;:576,&quot;bytes&quot;:71596,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DCXH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 424w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 848w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 1272w, https://substackcdn.com/image/fetch/$s_!DCXH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8158f68-506c-4f61-8e8c-6451e8d719a8_761x648.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report highlights that shadow AI incidents cost more, up to $200,000 more than typical incidents, often involving customer and employee PII, IP, and other sensitive data exposure.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8T2H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8T2H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 424w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 848w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 1272w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8T2H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png" width="323" height="203.72506738544473" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7355b546-d747-4ff2-b810-491c078b24d4_371x234.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:234,&quot;width&quot;:371,&quot;resizeWidth&quot;:323,&quot;bytes&quot;:28711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8T2H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 424w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 848w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 1272w, https://substackcdn.com/image/fetch/$s_!8T2H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7355b546-d747-4ff2-b810-491c078b24d4_371x234.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jPFm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jPFm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 424w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 848w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 1272w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jPFm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png" width="377" height="277" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:277,&quot;width&quot;:377,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!jPFm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 424w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 848w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 1272w, https://substackcdn.com/image/fetch/$s_!jPFm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb866a476-bbfb-4fcb-82b3-d7be713276d2_377x277.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our era of fear-of-missing-out (FOMO) hype driven AI adoption, where organizations are afraid of falling behind peers, whether internal or external, organizational AI governance lags behind AI adoption. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ycpT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ycpT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 424w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 848w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 1272w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ycpT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png" width="619" height="487.95045045045043" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8574e451-97d5-4fd0-807f-98358a81852e_888x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:700,&quot;width&quot;:888,&quot;resizeWidth&quot;:619,&quot;bytes&quot;:384077,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ycpT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 424w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 848w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 1272w, https://substackcdn.com/image/fetch/$s_!ycpT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8574e451-97d5-4fd0-807f-98358a81852e_888x700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>&#8220;87% of organizations said they have no governance policies or processes to mitigate AI risk.&#8221;</strong></p></blockquote><p>The above line should alarm security professionals and excite attackers, AI security startups, and investors alike. Most organizations simply haven&#8217;t addressed AI governance despite the business and developers being off and running with AI services, products, models, and more. </p><p>Two things also jumped out to me:</p><ul><li><p><strong>Most organizations that DO have some governance policies in place are using &#8220;strict approval processes for AI deployments.&#8221;</strong></p></li><li><p><strong>Yet few have actual AI security tools or governance technology in place</strong></p></li></ul><p>This inevitably leads to problems I have discussed in other articles, where legacy manual approval and assessment processes lead to shadow usage as the business and organizations work around these siloed, ineffective approaches. </p><p>We&#8217;re literally repeating the painful mistakes of the past, including those tied to SaaS, such as:</p><ul><li><p>A lack of deep visibility or governance over usage</p></li><li><p>Manual ineffective review processes which foster shadow usage</p></li><li><p>No real understanding of what is being used, what data is being shared or who is accessing what</p></li><li><p>No insight into the provenance of open source models, security of commercial model providers, and more</p></li></ul><h2>Security AI and Automation</h2><p>To be fair, I also want to highlight another interesting takeaway from the report. While organizations with poor AI governance, visibility and security in place are experiencing more costly and impactful incidents, those who are embracing AI <em><strong>for</strong></em> security are seeing lower average costs of a data breach as well. </p><p>This reflects the dual nature of AI and security, where AI needs to be secured, but can also be used for cybersecurity, to address systemic challenges in key areas such as GRC, AppSec and SecOps among others.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qycp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qycp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 424w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 848w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 1272w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qycp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png" width="1134" height="631" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:631,&quot;width&quot;:1134,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:409626,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qycp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 424w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 848w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 1272w, https://substackcdn.com/image/fetch/$s_!Qycp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ca913d7-b7f4-49e1-bcf8-a33d6b899003_1134x631.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These reduced incident costs are being driven by factors such as:</p><ul><li><p><strong>Faster incident identification and containment</strong></p></li><li><p><strong>Improved prevention</strong></p></li><li><p><strong>Enhanced investigation</strong></p></li></ul><p>Another refreshing metric was that security teams are adopting AI at the same rate as other business functions:</p><blockquote><p><strong>&#8220;A combined 77% were either adopting AI on with or advanced than the wider organization.&#8221;</strong></p></blockquote><p>This is something I discussed deeply in my article &#8220;<strong><a href="https://www.resilientcyber.io/p/securitys-ai-driven-dilemma">Security&#8217;s AI-Driven Dilemma: A discussion on the rise of AI-driven development and security&#8217;s challenge and opportunity to cross the chasm</a></strong>&#8221;, </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b8zH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b8zH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 424w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 848w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 1272w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b8zH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png" width="1045" height="531" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:531,&quot;width&quot;:1045,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:175711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b8zH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 424w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 848w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 1272w, https://substackcdn.com/image/fetch/$s_!b8zH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee5ea862-c25e-42bf-90ab-1a2c7cfaf9de_1045x531.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This demonstrates that the cybersecurity community is learning from its past mistakes, where it was a laggard and late adopter of emerging technology. Instead, it is looking to be an early adopter of AI and apply it to various cybersecurity use cases.</p><p>This also highlights where we&#8217;re seeing a <em><strong>TON</strong></em> of both investments in cybersecurity startups leveraging AI and looking to tackle various cybersecurity use cases. The IBM report even provides insights into the areas organizations are planning to invest in AI-driven solutions (take note, founders, incumbents, and investors): </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8psK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8psK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 424w, https://substackcdn.com/image/fetch/$s_!8psK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 848w, https://substackcdn.com/image/fetch/$s_!8psK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 1272w, https://substackcdn.com/image/fetch/$s_!8psK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8psK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png" width="622" height="584" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:584,&quot;width&quot;:622,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97518,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169866661?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8psK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 424w, https://substackcdn.com/image/fetch/$s_!8psK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 848w, https://substackcdn.com/image/fetch/$s_!8psK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 1272w, https://substackcdn.com/image/fetch/$s_!8psK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d38af48-8bb1-4f48-92ea-22c5617c36d0_622x584.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2> Closing Thoughts</h2><p>AI represents a unique time in our technological evolution within the cybersecurity space. On one hand, we&#8217;re perpetuating the problems of the past, with a lack of governance and oversight, manual review processes, and rampant shadow usage.</p><p>On the other hand, we&#8217;re seeing security lean into being an early adopter and innovator with this emerging technology, rather than always being a late adopter and laggard. </p><p>This dichotomy represents the double-edged nature of AI more broadly: It offers tremendous potential but also significant problems if adopted poorly. </p><p>It remains to be seen which path we take in the long term, but I&#8217;m personally bullish on AI's potential to tackle longstanding cyber challenges or at least help. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Fast and Flawed]]></title><description><![CDATA[Diving into Veracode's "2025 GenAI Code Security Report: Assessing the Security of Using LLMs for Coding"]]></description><link>https://www.resilientcyber.io/p/fast-and-flawed</link><guid isPermaLink="false">https://www.resilientcyber.io/p/fast-and-flawed</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Fri, 01 Aug 2025 14:27:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/057fe191-ab5e-40ab-bc8a-530218be0070_1200x800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>One of the most relevant trends in widespread AI and LLM adoption is the way AI is fundamentally changing the nature of modern software development. While I won&#8217;t be covering that in depth here, the trend is well documented, from industry leaders such as Google and others to the rise of AI-native software development platforms such as Cursor, which are seeing widespread adoption and use. Folks such as <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;The Pragmatic Engineer&quot;,&quot;id&quot;:458709,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/pragmaticengineer&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/5ecbf7ac-260b-423b-8493-26783bf01f06_600x600.png&quot;,&quot;uuid&quot;:&quot;033df301-06e4-4977-ab21-718e79a8f48f&quot;}" data-component-name="MentionToDOM"></span> have also covered the topic extensively.</p><p>It&#8217;s fairly well documented how these tools can increase development velocity and developer productivity, but what remains to be seen is how secure the code these tools produce is.</p><p>I&#8217;ve covered previous resources on this topic, such as <strong><a href="https://baxbench.com/">BaxBench</a></strong>, which found that:</p><ul><li><p>62% of the code generated, even by leading models, is incorrect or contains security vulnerabilities</p></li><li><p>Roughly 50% of the correct solutions generated are insecure</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a5AY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a5AY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 424w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 848w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 1272w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a5AY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png" width="346" height="230.66666666666666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:304,&quot;width&quot;:456,&quot;resizeWidth&quot;:346,&quot;bytes&quot;:32124,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a5AY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 424w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 848w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 1272w, https://substackcdn.com/image/fetch/$s_!a5AY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09f240f4-e258-4b4b-9c25-8ef76fa247f2_456x304.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KGgz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KGgz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 424w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 848w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 1272w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KGgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png" width="1058" height="397" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:397,&quot;width&quot;:1058,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:146920,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KGgz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 424w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 848w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 1272w, https://substackcdn.com/image/fetch/$s_!KGgz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd72fae54-358e-42dd-b14a-0ea6ea215365_1058x397.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Other studies and research with various models <strong><a href="https://arxiv.org/pdf/2506.23034">have shown</a></strong> that code being generated by LLMs includes vulnerabilities ranging from 40%-74% of the time, especially in the absence of security-centric prompting, something I have discussed with Jim Manico at length on a recent episode of the Resilient Cyber Show, below:</p><div id="youtube2-iUI36c3c75Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;iUI36c3c75Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/iUI36c3c75Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Safe to say, the AppSec community is closely watching the security implications of the widespread adoption of AI and LLMs for software development. That&#8217;s why this <strong><a href="https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report">recent report from Veracode</a></strong> caught my attention and I wanted to take a look at it. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1Mf-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 424w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 848w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 1272w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1Mf-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png" width="307" height="392.96" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:736,&quot;width&quot;:575,&quot;resizeWidth&quot;:307,&quot;bytes&quot;:141568,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1Mf-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 424w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 848w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 1272w, https://substackcdn.com/image/fetch/$s_!1Mf-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7f883cf-233c-4fdc-a08f-833d731520a3_575x736.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity</strong>.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><h1>Key Findings</h1><p>As the report opens with, developers can use these LLMs and AI coding tools to get the code and outputs they desire with no mention or consideration of security, which leads to insecure outputs as one might expect. </p><p>This is similar to traditional software development in the sense that a combination of factors such as a lack of secure development training and awareness coupled with a lack of incentives to prioritize security leads to developers just moving fast, focusing on speed to market, velocity and feature development (much to the dismay of those who clamor to dreams of widespread Secure-by-Design adoption). </p><p>Veracode set out to examine, in the absence of security-specific prompting and guidance, whether LLMs produce secure code?</p><p>Veracode ran their own SAST tool against the resulting code to identify vulnerabilities and the results should be telling for the community, as we know most developers adopting these tools aren&#8217;t using security-specific prompting and that has implications for the attack surface of the future, especially against the backdrop of double-digit &#8220;productivity&#8221; gains (e.g. higher code volume and velocity) as well as the democratization of development for those without a background in programming.</p><p>Veracode provided 80 coding tasks to over 100 different LLMs to ensure a diversity of models, providers and applications/intents. I want to dig a bit deeper into their findings, but first, they provided a summarized image of key findings below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7D2N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7D2N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 424w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 848w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 1272w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7D2N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png" width="430" height="389.2701863354037" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:583,&quot;width&quot;:644,&quot;resizeWidth&quot;:430,&quot;bytes&quot;:112592,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7D2N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 424w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 848w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 1272w, https://substackcdn.com/image/fetch/$s_!7D2N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F060e447c-a517-4ece-82d6-4b1b94fd4127_644x583.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> I thought a few things right away were interesting. <em><strong>Aside from nearly half of all the outputs being insecure</strong></em>, the security performance remained flat despite larger/newer models, which contradicts a lot of the hype about the latest model or benchmark, etc. - at least from the perspective of a security practitioner. </p><blockquote><p><strong>Larger or newer models don&#8217;t necessarily mean better, from a security lens.</strong></p></blockquote><p>Veracode&#8217;s research focused on four specific CWEs, 80 coding tasks, for programming languages, and five coding task sequences, as summarized below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g41W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g41W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 424w, https://substackcdn.com/image/fetch/$s_!g41W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 848w, https://substackcdn.com/image/fetch/$s_!g41W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 1272w, https://substackcdn.com/image/fetch/$s_!g41W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g41W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png" width="268" height="259.35483870967744" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:310,&quot;resizeWidth&quot;:268,&quot;bytes&quot;:29770,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g41W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 424w, https://substackcdn.com/image/fetch/$s_!g41W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 848w, https://substackcdn.com/image/fetch/$s_!g41W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 1272w, https://substackcdn.com/image/fetch/$s_!g41W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22260d59-1305-45cc-9a16-e808b0349e8d_310x300.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Their core research questions are below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!knX7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!knX7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 424w, https://substackcdn.com/image/fetch/$s_!knX7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 848w, https://substackcdn.com/image/fetch/$s_!knX7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 1272w, https://substackcdn.com/image/fetch/$s_!knX7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!knX7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png" width="545" height="338.5242290748899" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:423,&quot;width&quot;:681,&quot;resizeWidth&quot;:545,&quot;bytes&quot;:65597,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!knX7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 424w, https://substackcdn.com/image/fetch/$s_!knX7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 848w, https://substackcdn.com/image/fetch/$s_!knX7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 1272w, https://substackcdn.com/image/fetch/$s_!knX7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f0179f0-20f8-4266-9ea3-c01650646839_681x423.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Veracode team chose these four vulnerabilities to focus on in the study because they&#8217;re among the OWASP Top 10, the accuracy of the SAST tooling for the findings, and the fact that there are at least two possible implementations of the desired output code from the provided functional descriptions. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SnZd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SnZd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 424w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 848w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 1272w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SnZd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png" width="351" height="259" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e57098ca-6efe-4133-9602-31427e553867_351x259.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:259,&quot;width&quot;:351,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:24931,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SnZd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 424w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 848w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 1272w, https://substackcdn.com/image/fetch/$s_!SnZd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe57098ca-6efe-4133-9602-31427e553867_351x259.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One important point to highlight is that Veracode points out that its possible security-specific prompting may have led to more secure outputs. I agree with them, and this has been demonstrated by studies such as those I cited earlier in this article, but the reality is that most developers <em><strong>are not</strong></em> using security-specific prompting, much like they haven&#8217;t historically focused on developing security code and applications. </p><p>All this said, let&#8217;s look at the results, which I found interesting. </p><h1>Results</h1><p>Veracode found the models are indeed increasingly capable at generating functional code, but when it comes to security, they are not doing well, and that is a problem not isolated to any particular model, model size etc. </p><p>They found that 45% of the time, the models introduced detecting vulnerabilities correlated with the OWASP Top 10 we mentioned previously. Below, they summarize that the models are generating compilable functional code (blue), but vulnerable code nearly half of the time (pink). </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s2Df!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s2Df!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 424w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 848w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 1272w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s2Df!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png" width="339" height="213" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:213,&quot;width&quot;:339,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25913,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s2Df!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 424w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 848w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 1272w, https://substackcdn.com/image/fetch/$s_!s2Df!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd90db2b4-2d10-4f4b-84ed-c7dc7b15e8d8_339x213.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rVyS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rVyS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 424w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 848w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 1272w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rVyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png" width="859" height="481" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:481,&quot;width&quot;:859,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69254,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rVyS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 424w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 848w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 1272w, https://substackcdn.com/image/fetch/$s_!rVyS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d498f64-646c-492c-b813-6fcbdda0a0ad_859x481.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now, some may be inclined to say well that&#8217;s just for language &#8220;x&#8221;!</p><p>But, Veracode ran the study across Python, Javascript, Csharp and Java, and the findings are pretty consistent across the board and over time. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i7rz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i7rz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 424w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 848w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 1272w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i7rz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png" width="824" height="483" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:483,&quot;width&quot;:824,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i7rz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 424w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 848w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 1272w, https://substackcdn.com/image/fetch/$s_!i7rz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03411fca-3159-40a3-b82a-e9f4959a3f07_824x483.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>Again, it&#8217;s functional code. But secure? Not so much.</strong></p></blockquote><p>While the general security pass rate is relatively consistent, they did find variability among the CWE&#8217;s involved in their study, as shown below: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VoNv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VoNv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 424w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 848w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 1272w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VoNv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png" width="633" height="378.683879093199" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e950e955-46fe-4a10-ac27-30269f5709e0_794x475.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:475,&quot;width&quot;:794,&quot;resizeWidth&quot;:633,&quot;bytes&quot;:96554,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VoNv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 424w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 848w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 1272w, https://substackcdn.com/image/fetch/$s_!VoNv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe950e955-46fe-4a10-ac27-30269f5709e0_794x475.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bYdy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bYdy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 424w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 848w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 1272w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bYdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png" width="354" height="245" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8650413a-583c-4252-834c-f529c9000e02_354x245.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:245,&quot;width&quot;:354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:28793,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bYdy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 424w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 848w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 1272w, https://substackcdn.com/image/fetch/$s_!bYdy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8650413a-583c-4252-834c-f529c9000e02_354x245.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As I mentioned above, their findings were consistent across model sizes as well: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DW3n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DW3n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 424w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 848w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 1272w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DW3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png" width="650" height="367.12247324613554" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:475,&quot;width&quot;:841,&quot;resizeWidth&quot;:650,&quot;bytes&quot;:80317,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DW3n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 424w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 848w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 1272w, https://substackcdn.com/image/fetch/$s_!DW3n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F037b3484-62ae-48b6-9e33-01acf4ef949b_841x475.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Veracode closes the report by asking some crucial questions for the security community to reflect on, especially as AI-driven development continues to grow in adoption and use rapidly:</p><ul><li><p><strong>Why isn&#8217;t security performance improving, even as syntactic performance improves?</strong></p></li><li><p><strong>Why are there such stark differences between the CWEs? In particular, why do models perform so poorly on cross-site scripting and log injection cases?</strong></p></li><li><p><strong>Why is Java performance significantly worse than that of the other languages?</strong></p></li></ul><p>The findings align with broader discussions about AI-driven development among the AppSec community. Fundamental realities include the fact that these models are overwhelmingly trained on open source code, meaning they generally inherit the same vulnerabilities, insecure configurations, etc. </p><p>I discussed the vulnerability landscape of the open source ecosystem extensively in a previous article titled &#8220;<strong><a href="https://www.resilientcyber.io/p/the-2025-open-source-security-landscape">The 2025 Open Source Security Landscape</a></strong>&#8221;. This includes metrics such as those depicted below, showing how vulnerable the open source landscape is:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4WTo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4WTo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 424w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 848w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 1272w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4WTo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png" width="629" height="369.910085054678" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:823,&quot;resizeWidth&quot;:629,&quot;bytes&quot;:203509,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169751511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4WTo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 424w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 848w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 1272w, https://substackcdn.com/image/fetch/$s_!4WTo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97e0e6ac-ab0a-4624-b525-767909b922ed_823x484.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>As the saying goes, garbage in, garbage out, or in this case, vulnerable code in, vulnerable code out</strong></p></blockquote><h1>Closing Thoughts</h1><p>This research from Veracode is an excellent contribution to the ongoing discussion about the security implications of AI-driven development. Organizations of all shapes and sizes are rapidly adopting AI coding tools due to productivity and velocity gain democratization of development for non-traditional non-traditional programmers. </p><p>This means more code, applications, products, and services, which is an amazing opportunity that will truly change the face of software development.</p><p>However, as discussed above, in the absence of security-specific prompting, it is very likely also rapidly expanding the digital attack surface at a pace we&#8217;ve never seen before. These challenges are exacerbated by studies showing Developers inherently trust the outputs from AI coding tools and aren&#8217;t slowing down to assess the security implications.</p><p><strong>Buckle up</strong>. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #58]]></title><description><![CDATA[PANW Acquires CyberArk, Cyber Acquisition Rumors/Trends, CISO&#8217;s in the Corner on AI, MCP&#8217;s Security Layer, GenAI Incident Response Guide & Software Under Siege]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-58</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-58</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 31 Jul 2025 13:25:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5yqJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome</h1><p>Welcome to issue #58 of the Resilient Cyber Newsletter.</p><p>We&#8217;re in peak summer and heading into Hacker Summer Camp (e.g., Black Hat), and things are crazy. </p><p>From M&amp;A trends and activities to big moves from the White House on AI, there are a ton of resources around Agentic AI and Cyber and AppSec reports with key insights from security teams and leaders.</p><p>So, without wasting more time, let&#8217;s get down to business!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5yqJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5yqJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 424w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 848w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 1272w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5yqJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png" width="523" height="376.4176870748299" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:529,&quot;width&quot;:735,&quot;resizeWidth&quot;:523,&quot;bytes&quot;:647213,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5yqJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 424w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 848w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 1272w, https://substackcdn.com/image/fetch/$s_!5yqJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F42affdc5-bfe2-4945-8052-53f7c6a62470_735x529.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pgwz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 424w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 848w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1272w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png" width="323" height="87.32020997375328" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:103,&quot;width&quot;:381,&quot;resizeWidth&quot;:323,&quot;bytes&quot;:8754,&quot;alt&quot;:&quot;Varonis Systems Inc | Atlanta Technology Professionals&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Varonis Systems Inc | Atlanta Technology Professionals" title="Varonis Systems Inc | Atlanta Technology Professionals" srcset="https://substackcdn.com/image/fetch/$s_!Pgwz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 424w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 848w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1272w, https://substackcdn.com/image/fetch/$s_!Pgwz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9dc0050-8e20-4f90-8b06-6c999ad2d84f_381x103.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Legacy DAM is a headache. It's time to get some relief.</h3><p>For years, database activity monitoring (DAM) has been an obligation driven by checking a box rather than driving outcomes or simplifying compliance.</p><p>That's because legacy DAM solutions were built for a different era &#8212; when deploying hundreds of agents and monitoring databases in isolation was considered acceptable. The AI era demands a new approach to data security.</p><p>Varonis Next-Gen DAM secures thousands of cloud, on-prem, structured, and unstructured databases with agentless monitoring that's easy to deploy and scale. As a part of the Varonis Data Security Platform, database security is no longer the domain of DBAs and a blind spot for security teams. Instead, they have a single pane of glass view into their data &#8212; wherever it lives.</p><p>Get some DAM relief with Varonis.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://hubs.ly/Q03zHgcY0&quot;,&quot;text&quot;:&quot;Discover Varonis Next-Gen DAM&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://hubs.ly/Q03zHgcY0"><span>Discover Varonis Next-Gen DAM</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-announces-agreement-to-acquire-cyberark--the-identity-security-leader">Palo Alto Set to Acquire CyberArk for $25 Billion</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6swT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6swT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 424w, https://substackcdn.com/image/fetch/$s_!6swT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 848w, https://substackcdn.com/image/fetch/$s_!6swT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 1272w, https://substackcdn.com/image/fetch/$s_!6swT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6swT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png" width="565" height="231.20204603580564" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:1173,&quot;resizeWidth&quot;:565,&quot;bytes&quot;:102001,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6swT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 424w, https://substackcdn.com/image/fetch/$s_!6swT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 848w, https://substackcdn.com/image/fetch/$s_!6swT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 1272w, https://substackcdn.com/image/fetch/$s_!6swT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c7c8447-fa1b-4ced-9de6-4ec8b9ccfb02_1173x480.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>In news that is racing through the cyber ecosystem, Palo Alto Networks (PANW) has entered into an agreement to acquire CyberArk, a leader in IAM. This move enables PANW&#8217;s platform strategy and helps them move into the Identity Security space with it as a core capability. </p><p>This move also signals PANW&#8217;s intent to play in the Agentic AI identity security space, where agents are poised and non-human identities are poised to outpace human users, exacerbating existing identity security challenges significantly. </p><p>There will inevitably more to come on this and deep industry analysis, so stay tuned for those resources as they get published. </p><h3><a href="https://strategyofsecurity.com/p/the-case-for-and-against-palo-alto-networks-acquiring-sentinelone">The Case For and Against PANW Acquiring SentinelOne </a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UAp5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UAp5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 424w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 848w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 1272w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UAp5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png" width="549" height="231.63098236775818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:335,&quot;width&quot;:794,&quot;resizeWidth&quot;:549,&quot;bytes&quot;:70260,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UAp5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 424w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 848w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 1272w, https://substackcdn.com/image/fetch/$s_!UAp5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc297d8ad-cc9e-422a-a52a-907139eb738f_794x335.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Speaking of PANW acquisitions, it is also being speculated that PANW is exploring acquiring SentinelOne. In typical fashion, my friend Cole Grolmus of Strategy of Security is on top of it, with an article discussing both the case FOR and AGAINST this move by PANW. </p><p>I won&#8217;t go deep on this one, given the CyberArk news it remains to be seen if PANW makes this move, but if you&#8217;re curious the implications be sure to give this piece a read.</p><h3><a href="https://franklyspeaking.substack.com/p/security-is-splitting-three-acquisitions">Security is Splitting: Three Acquisitions, Three Different Realities</a></h3><p>Apparently M&amp;A season is in full swing, as <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Frank Wang&quot;,&quot;id&quot;:9660728,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F367b1e11-2c2d-43d5-acdf-474df2b14f48_200x200.jpeg&quot;,&quot;uuid&quot;:&quot;9adc859e-3feb-40e1-8353-f6dcda07a59a&quot;}" data-component-name="MentionToDOM"></span> tackles three potential acquisitions in a recent piece as well, discussing how each one is unique and signals different things to the market. </p><p>Frank discusses the three acquisitions below:</p><ul><li><p><strong>Cursor &gt; Resourcely</strong></p></li><li><p><strong>PANW &gt; SentinelOne (Rumored, per the article I shared above)</strong></p></li><li><p><strong>DataDog &gt; Upwind (Rumored)</strong></p></li></ul><p>Each move has different motivations and signals. Cursor acquiring Resourcely demonstrates the move of building security directly into DevEx and Dev workflows. PANW, of course, is their desire to expand their platform play. DataDog and Upwind, again, are platform pushes but also align with the broader industry trend of moving towards Runtime security and trends such as Cloud Detection/Application Detection and Response (ADR). </p><h3><a href="https://www.linkedin.com/posts/kdshah_thrilled-to-announce-that-prophet-security-activity-7356325663324164096-6YVP?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Prophet Security Announces Its $30M Series </a>A</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FU-Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FU-Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 424w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 848w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 1272w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FU-Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png" width="879" height="431" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:431,&quot;width&quot;:879,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:187016,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FU-Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 424w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 848w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 1272w, https://substackcdn.com/image/fetch/$s_!FU-Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff61e62d1-6bf8-4450-8d9b-9bbd6b7d3273_879x431.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://www.linkedin.com/in/kdshah/">Kamal Shah</a></strong> and the <strong><a href="https://www.linkedin.com/company/prophetsecurity/posts/?feedView=all">Prophet Security</a></strong> team recently shared that they have finalized their $30M Series A financing, with the round led by Accel and Bain Capital Ventures, among others. </p><p>The team is driving towards an Agentic AI SOC Platform and looking to address longstanding SOC challenges, such as:</p><ul><li><p>Slashing investigation times</p></li><li><p>Reducing alert fatigue</p></li><li><p>Allowing analysts to focus on strategic work versus toil</p></li></ul><p>They represent one of the promising disrupting firms leaning into AI and Agents, and their potential to revolutionize the SecOps space. </p><p>I actually had Grant Oviatt from the Prophet Security team on in the past, who discussed transforming SecOps with AI SOC Analysts, and you can check out that full conversation below:</p><div id="youtube2-x8TYPmN2UII" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;x8TYPmN2UII&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/x8TYPmN2UII?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://www.linkedin.com/posts/doncio_containerization-technology-usage-memorandum-ugcPost-7356303336028966912-VSz6?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">U.S. Navy Goes All-in on Containers</a></h3><p>The Department of Navy CIO (DON CIO) recently released a memo titled &#8220;Containerization Technology Usage&#8221; which aims to drive adoption and use of containers across the Navy.</p><p>It specifically states:</p><blockquote><p><strong>&#8220;POLICY: Effective Immediately, all software development activities transitioning to the cloud and/or upgrades that are hosted in a cloud as outlined above must utilize containerization technology to the greatest extent practical".</strong></p></blockquote><p>This is a big opportunity when it comes to cybersecurity companies focused on securing container-based technologies and workloads.</p><h1>AI</h1><h3><a href="https://www.resilientcyber.io/p/ai-incentives-economics-technology">Winning the AI Race &#128640; - America&#8217;s AI Action Plan</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4vr-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4vr-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 424w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 848w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 1272w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4vr-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png" width="316" height="298.58775510204083" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9882bf76-513b-4871-a855-746b5657396a_490x463.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:463,&quot;width&quot;:490,&quot;resizeWidth&quot;:316,&quot;bytes&quot;:144796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4vr-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 424w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 848w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 1272w, https://substackcdn.com/image/fetch/$s_!4vr-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9882bf76-513b-4871-a855-746b5657396a_490x463.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last week <strong><a href="https://www.linkedin.com/company/the-white-house/">The White House</a></strong> unveiled the U.S. AI Action Plan. It's aimed at ensuring U.S. dominance in the race around AI. It is a great example of the intersection of technology, cybersecurity, AI, and geopolitics. <br><br>I spent some time this weekend delving into the plan and analyzing its major implications, both technologically and politically. </p><ul><li><p>This includes the race for AI dominance, largely between China and the U.S.</p></li><li><p>Nuances around commercial and open source models, energy demands, and workforce implications</p></li><li><p>Venture capital, investments, startups, and resource allocation</p></li><li><p>AI's intersection with Cybersecurity, both from a governance and regulatory perspective, as well as the dual-edged nature of AI, both needing to be secured and having promising potential to address systemic cybersecurity challenges, both offensively and defensively. </p><p></p><p>Software and technology increasingly underpin everything from critical infrastructure, consumer goods, geopolitics, and national security</p></li></ul><div id="youtube2-HmxbPH1PL_A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HmxbPH1PL_A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HmxbPH1PL_A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://saanyaojha.substack.com/p/shadow-ai-scope-creep-and-the-ciso">Shadow AI, Scope Creep, and the CISO in the Corner</a></h3><p>We continue to see rampant AI adoption across enterprise environments, and like previous technological waves before it, Cyber is challenged with keeping pace, being viewed as an enabler rather than a blocker to the business and simply governing the consumption and use of new technologies, products, and services.</p><p>This piece from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Saanya Ojha&quot;,&quot;id&quot;:7673984,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3de4fe4e-1679-4eaa-9986-8870264a1cdf_400x400.jpeg&quot;,&quot;uuid&quot;:&quot;5dafb6b6-b9a1-47ad-97c9-fbe0752fd098&quot;}" data-component-name="MentionToDOM"></span> serves as a field report from CISOs on the state of enterprise AI adoption and the challenges CISOs face.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T8tg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T8tg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 424w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 848w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 1272w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T8tg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png" width="273" height="375.18715596330276" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:749,&quot;width&quot;:545,&quot;resizeWidth&quot;:273,&quot;bytes&quot;:677024,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T8tg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 424w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 848w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 1272w, https://substackcdn.com/image/fetch/$s_!T8tg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab3b4081-46b7-48d0-b08c-41d72571728c_545x749.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the article, she frames CISOs as the &#8220;adult chaperones at the no-holds-barred enterprise AI party&#8221;. She lays out three key things for security leaders to do or keep in mind:</p><ul><li><p>Governance <strong>must</strong> assume AI is already in use</p></li><li><p>Scope creep is inevitable; plan for it</p></li><li><p>Experimentation is the goal, not the threat</p></li><li><p>AI amplifies old risks more than it invents new ones</p></li><li><p>Policies are only as good as their enforcement</p></li></ul><p>She highlights that AI governance isn&#8217;t a new discipline but is much faster, messier, and has higher stakes than previous challenges. Therefore, ensuring the security fundamentals are more important than ever to enable secure enterprise AI adoption. </p><h3><a href="https://blog.trailofbits.com/2025/07/28/we-built-the-security-layer-mcp-always-needed/">We Built the Security Layer MCP Always Needed</a></h3><p>The Model Context Protocol (MCP) continues to generate excitement, as it helps give LLMs arms and legs, supports semi- or fully autonomous workflows, facilitates tool integrations, and more. </p><p>That said, various folks have raised issues with the MCP specification around IAM and ways to abuse MCP, such as embedding prompt injections in the MCP tool descriptions. Attacks include data exfiltration and code execution, among others. </p><p>That&#8217;s why this open-source tool from Trail of Bits (in beta release) is so awesome. &#8220;<strong>mcp-context-protector</strong>&#8221; functions as a security wrapper for LLM apps using MCP. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!39NQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!39NQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 424w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 848w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 1272w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!39NQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png" width="844" height="269" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:269,&quot;width&quot;:844,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39966,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!39NQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 424w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 848w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 1272w, https://substackcdn.com/image/fetch/$s_!39NQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4ed8c80-0248-4841-a83e-58e0c25f7b4b_844x269.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The tool sits between LLMs and downstream servers and can perform security checks on messages before they enter an LLMs context window. The key security features the team highlights as part of the mcp-context-protector tool include:</p><ul><li><p>Trust-on-first-use server pinning</p></li><li><p>LLM guardrail scanning of tool responses</p></li><li><p>Sanitizing ANSI control sequences</p></li></ul><p>The LLM Guardrail allows for integration with other toolkits such as LLamaFirewall from Meta, or NeMo Guardrails from NVIDIA. Then if unsafe content or prompt injections are detected, responses get placed into a quarantine:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i5ag!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i5ag!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 424w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 848w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 1272w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i5ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png" width="574" height="338.46206896551723" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:513,&quot;width&quot;:870,&quot;resizeWidth&quot;:574,&quot;bytes&quot;:53232,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i5ag!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 424w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 848w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 1272w, https://substackcdn.com/image/fetch/$s_!i5ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd1a1b6e-c8b4-483c-98bc-45bcd4a16d3b_870x513.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That said, they also admit to some challenges, such as the need for manual configuration review and alert fatigue associated with reviewing quarantined alerts that the tool may flag. </p><h3><a href="https://genai.owasp.org/resource/genai-incident-response-guide-1-0/">GenAI Incident Response Guide &#128213;</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6nKu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6nKu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 424w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 848w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 1272w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6nKu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png" width="233" height="303.2025974025974" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:501,&quot;width&quot;:385,&quot;resizeWidth&quot;:233,&quot;bytes&quot;:58057,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6nKu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 424w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 848w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 1272w, https://substackcdn.com/image/fetch/$s_!6nKu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b724468-6189-4aef-9e9d-f8313c5e4957_385x501.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The recent U.S. AI Action Plan published by <strong><a href="https://www.linkedin.com/company/the-white-house/">The White House</a></strong> called for updating incident response plans and measures to account for AI-related threats. And, in typical <strong><a href="https://www.linkedin.com/company/owasp-top-10-for-large-language-model-applications/">OWASP GenAI Security Project</a></strong> fashion, the crew just dropped <strong><a href="https://www.linkedin.com/company/owasp/">OWASP&#174; Foundation</a></strong>'s "<strong><a href="https://genai.owasp.org/resource/genai-incident-response-guide-1-0/">GenAI Incident Response Guide 1.0</a></strong>"<br><br>It's a comprehensive guide, covering:</p><ul><li><p>Defining AI incidents, including real-world examples, and distinguishing between AI and Cyber incidents</p></li><li><p>Preparing for AI Incident Response, including Risk Assessment and Management, AI system inventory, detecting and reporting AI incidents, and responding</p></li><li><p>Event-specific guidance, such as attacks on AI systems, supply chains, and third-party model providers</p><p></p><p>This is a great resource for organizations looking to modernize their IR plans and processes to account for emerging AI threats and risks.</p></li></ul><h3><strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-christian-posta">Resilient Cyber w/ Christian Posta MCP, Agents &amp; IAM in the age of LLMs</a></strong></h3><p>In this episode, we sit down with Christian Posta, the Field CTO at Solo.io and an industry author and leader on topics such as Microservices, AI, and IAM.<br><br>We will explore the rise of Agentic AI and its supporting protocols, such as MCP and A2A, and the broader challenges and considerations of Identity security in the age of LLMs.</p><p>We discussed:</p><ul><li><p>The topic of Agentic Identity and the rise of protocols such as MCP</p></li><li><p>The original MCP specification, gaps it had and why they were concerning</p></li><li><p>Despite improvements to the MCP spec, continued challenges and risks for organizations to consider</p></li><li><p>How the widespread adoption of Agents and Agentic Workflows and their associated protocols will change the attack landscape</p></li></ul><div id="youtube2-qjiNMXfELSE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;qjiNMXfELSE&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/qjiNMXfELSE?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>AppSec, Vulnerability Management, and Supply Chain Security</h1><h3><a href="https://boringappsec.substack.com/p/the-sdlc-is-changing-and-so-will">The SDLC is Changing and So Will AppSec (Again)</a></h3><p>We know that we&#8217;re seeing AI-driven development fundamentally reshape software development, from coding agents, copilots, LLM&#8217;s and more. These changes inevitably will have downstream ramifications for AppSec. </p><p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;id&quot;:2048762,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3669f91b-c03e-4ab0-9868-75488f21717a_895x1097.jpeg&quot;,&quot;uuid&quot;:&quot;759ae775-5e10-4ab7-80b7-bd3d68bf4ef7&quot;}" data-component-name="MentionToDOM"></span> of Boring AppSec makes that case in a recent article. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BDcH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BDcH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 424w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 848w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 1272w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BDcH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png" width="1013" height="528" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:528,&quot;width&quot;:1013,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:199333,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BDcH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 424w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 848w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 1272w, https://substackcdn.com/image/fetch/$s_!BDcH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7eb193eb-e284-4745-94ec-bdc45e937476_1013x528.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As he discusses, each aspect of the SDLC is changing from Design through Deployment, with new AI-powered technology stacks coming into play. Sandesh gave a topic focused on this at TiE Silicon Valley:</p><div id="youtube2-VjxNPH5gxjs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;VjxNPH5gxjs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/VjxNPH5gxjs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Sandesh doesn&#8217;t pretend to have all of the answers of what AppSec looks like in the future, but says these two questions <em><strong>must</strong></em> be answered:</p><ul><li><p>How should we manage prompts?</p></li><li><p>What should automated code and prompt review look like?</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aZi7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aZi7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 424w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 848w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 1272w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aZi7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png" width="951" height="476" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:476,&quot;width&quot;:951,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176663,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aZi7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 424w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 848w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 1272w, https://substackcdn.com/image/fetch/$s_!aZi7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0fd229f-32b9-4adc-a2e8-12c18d69af78_951x476.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each of these questions come with their own nuances and considerations as well. Such as how prompts get stored and versioned, or what a testing cadence for prompts looks like. </p><p>This is a thought provoking piece for the changes to AppSec as part of the changes to upstream software development with AI-driven development taking major hold across the industry.</p><h3><a href="https://www.contrastsecurity.com/security-influencers/software-under-siege-app-layer-threats-runtime-defense">Software Under Seige 2025</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SlVa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SlVa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 424w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 848w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 1272w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SlVa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png" width="319" height="287.8975" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:722,&quot;width&quot;:800,&quot;resizeWidth&quot;:319,&quot;bytes&quot;:565693,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SlVa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 424w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 848w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 1272w, https://substackcdn.com/image/fetch/$s_!SlVa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b053439-1c8c-4efb-8aae-80b55b8bfcb1_800x722.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What are the blind spots in software security? This is a good report from the Contrast Security team diving into those exact topics. It covers topics relevant for security teams and CISO&#8217;s, such as</p><ul><li><p>Attack Volume and Breakdowns</p></li><li><p>The Growth of Software Vulnerabilities</p></li><li><p>Disadvantages of Defenders due to the increasing speed of attackers compared to organizations ability to patch</p></li></ul><p>The report discusses how AI-driven development is only exacerbating existing AppSec challenges, and the average application is exposed to 81 confirmed viable attacks monthly, and over 10,000 probes/attack attempts that don&#8217;t succeed. This is all while the average number of vulnerabilities continues to grow per application. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ab0D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ab0D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 424w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 848w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 1272w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ab0D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png" width="554" height="594.0394218134035" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:761,&quot;resizeWidth&quot;:554,&quot;bytes&quot;:163022,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ab0D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 424w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 848w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 1272w, https://substackcdn.com/image/fetch/$s_!Ab0D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc6736e9-fa36-4c46-a58b-4300dd0befeb_761x816.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report emphasizes the importance of runtime data, and aligns with the broader industry shift towards Application Detection and Response (ADR), especially among many growing frustrated with how poorly DevSecOps has been implemented and the toil it has caused Developers. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cKGh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cKGh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 424w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 848w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 1272w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cKGh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png" width="561" height="248.77249357326477" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:345,&quot;width&quot;:778,&quot;resizeWidth&quot;:561,&quot;bytes&quot;:66824,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169581854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cKGh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 424w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 848w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 1272w, https://substackcdn.com/image/fetch/$s_!cKGh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6cccbfc3-36ee-45e0-a133-b56ff1e38ca5_778x345.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s a lot of great insights in this report, and I plan to give it a deeper review and possibly a write up soon. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[AI - Incentives, Economics, Technology and National Security]]></title><description><![CDATA[A look at the recently unveiled U.S. AI Action Plan and its implications the race for AI dominance]]></description><link>https://www.resilientcyber.io/p/ai-incentives-economics-technology</link><guid isPermaLink="false">https://www.resilientcyber.io/p/ai-incentives-economics-technology</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Mon, 28 Jul 2025 13:21:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!LSa-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There&#8217;s absolutely no denying that AI dominates the discussion these days, not just in technology but in venture capital, along with broader discussions around economics, the workforce, and even national security. </p><p>The current presidential administration has made positioning the U.S. as a dominant force in AI at the forefront of their policy objectives and recently unveiled the U.S. <strong><a href="https://www.whitehouse.gov/articles/2025/07/white-house-unveils-americas-ai-action-plan/">AI Action Plan</a></strong>, which I will be diving into throughout this article, looking at it from various angles in terms of economics, national security and of course, cybersecurity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.whitehouse.gov/articles/2025/07/white-house-unveils-americas-ai-action-plan/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LSa-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 424w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 848w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LSa-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png" width="455" height="427.1875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1367,&quot;width&quot;:1456,&quot;resizeWidth&quot;:455,&quot;bytes&quot;:514867,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.whitehouse.gov/articles/2025/07/white-house-unveils-americas-ai-action-plan/&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LSa-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 424w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 848w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!LSa-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed78f986-a244-4af8-af05-e5e8af37f72b_1636x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><h1>High Level </h1><p>At a high level, the AI Action Plan covers three core pillars:</p><p><strong>Pillar I - Accelerate AI Innovation</strong></p><p><strong>Pillar II - Build American AI Infrastructure</strong></p><p><strong>Pillar III - Lead in International Diplomacy and Security</strong></p><p>Each pillar covers different aspects of the U.S.&#8217;s overall AI aspirations and key pathways to enabling U.S. dominance in AI through various means. </p><p><a href="https://open.substack.com/users/97776398-chamath-palihapitiya?utm_source=mentions">Chamath Palihapitiya</a> and the crew at All-In recently helped facilitate a &#8220;Winning the AI Race&#8221;, featuring speakers across Government and industry, including comments from President Trump himself on the AI Action plan.</p><div id="youtube2-HmxbPH1PL_A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HmxbPH1PL_A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HmxbPH1PL_A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I recommend listening to not just President Trump&#8217;s comments but the other parts of the series too, as it provides insights from founders, investors, Government senior leadership and policy folks and more. This includes leadership from NVIDIA, AMD, Vice President J.D. Vance, the Treasury Secretary among others. </p><p>The introduction of the AI Action plan discusses the U.S.&#8217;s ambitions around achieving and sustaining AI dominance. This is primarily of course a race between the US and China, as the nations pursue global AI leadership. </p><p>I recently shared an excellent deep dive from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Contrary Research&quot;,&quot;id&quot;:1511474,&quot;type&quot;:&quot;pub&quot;,&quot;url&quot;:&quot;https://open.substack.com/pub/contraryresearch&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eae931ab-7dc4-4c69-97d5-69c37736827b_400x400.png&quot;,&quot;uuid&quot;:&quot;40a183fb-1635-4c86-91da-7e739c4ca66c&quot;}" data-component-name="MentionToDOM"></span> on this topic, titled &#8220;<strong><a href="https://research.contrary.com/deep-dive/ai-progress-the-battlefield-of-cold-war-2.0">AI Progress: The Battlefield of Cold War 2.0</a></strong>&#8221;. It discusses the distinct approaches between the two nations, with the US approach being more capital markets-driven and compute rich, whereas China&#8217;s approach is more state-led ambition, along with its accompanying hurdles. </p><p>The White House previously issued EO 14179 &#8220;<strong><a href="https://www.whitehouse.gov/presidential-actions/2025/01/removing-barriers-to-american-leadership-in-artificial-intelligence/">Removing Barriers to American Leadership in AI&#8221;</a></strong>, which laid the groundwork for the action plan we will discuss. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8X6W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8X6W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 424w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 848w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 1272w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8X6W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png" width="482" height="324.4230769230769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:980,&quot;width&quot;:1456,&quot;resizeWidth&quot;:482,&quot;bytes&quot;:1872844,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8X6W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 424w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 848w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 1272w, https://substackcdn.com/image/fetch/$s_!8X6W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41e963c0-be83-4bdf-84ba-8f77fa2d12a3_1658x1116.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many of these topics and more were covered during the All-In AI Race event from the various speakers and perspectives. </p><p>Pillars and specifics aside, it is clear not just in the action plan but from the current presidential administration in general that they believe AI is absolutely critical to US geopolitical interests, economic prosperity and national security. </p><p>Before going deeper, the the action plan does call out specific principles that it says cut across all three pillars, which I think are worth highlighting:</p><ul><li><p>The importance of American workers and the need to ensure American workers and their families benefit from the opportunities of the AI revolution</p></li><li><p>The need to ensure American AI systems are free from ideological bias and designed to pursue objective truth over social engineering</p></li><li><p>Preventing advanced technologies from being misused or stolen by malicious actors</p></li></ul><h2>Pillar I: Accelerate AI Innovation</h2><p>As the name implies, this pillar is all about acceleration and calls out specific phrases such as &#8220;removing red tape and onerous regulation&#8221;. This particularly draws stark parallels in my mind when it comes to the drastically different approaches being taken between the US and EU when it comes to AI regulation. </p><p>In the US, we see a clear call out and emphasis on removing regulation to accelerate innovation, whereas in the EU we see a push to become a regulatory super power and an emphasis on safety and security (even if misperceived) over enabling commercial innovation and speed. </p><p>In fact, the EU Commission recently stated there will be &#8220;<strong><a href="https://www.jdsupra.com/legalnews/no-stop-the-clock-for-the-eu-ai-act-and-6562922/">no pause</a></strong>&#8221; when it comes to the roll out and timelines of the EU AI Act, despite pleas from <strong><a href="https://www.sdxcentral.com/news/eu-rushes-ai-guidance-after-refusing-tech-giants-pause-plea/">46 of the EU&#8217;s largest companies</a></strong> calling for a pause on the implementation of the EU AI Act. </p><p>No where was this distinction between the US and EU on AI more evident than Vice President JD Vance&#8217;s comments at the Paris AI Summit, where he railed against topics such as excessive AI regulation:</p><div id="youtube2-64E9O1Gv99o" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;64E9O1Gv99o&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/64E9O1Gv99o?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>While not directly related to AI, diagrams such as the ones below highlight just the massive difference between the US and EU when it comes to markets, capital and technology (note the outsized presence of technology centric companies in the US side of the first diagram).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WOR_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WOR_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 424w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 848w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WOR_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png" width="675" height="378.2967032967033" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:675,&quot;bytes&quot;:1065147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WOR_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 424w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 848w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!WOR_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54b6b35b-947f-451b-a2b1-a43aa47e4f4e_1824x1022.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Furthering this trajectory is news that <strong><a href="https://www.bloomberg.com/news/articles/2025-07-14/europe-s-vcs-are-on-pace-for-lowest-fundraising-year-in-a-decade?embedded-checkout=true">Europe&#8217;s VCs are on pace for the lowest fundraising year in a decade</a>:</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wn9N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wn9N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 424w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 848w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 1272w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wn9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png" width="537" height="287.67857142857144" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:780,&quot;width&quot;:1456,&quot;resizeWidth&quot;:537,&quot;bytes&quot;:98221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wn9N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 424w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 848w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 1272w, https://substackcdn.com/image/fetch/$s_!wn9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b3b83c0-f564-4bce-b038-011acf5f2c64_1676x898.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is <strong><a href="https://nvca.org/press_releases/nvca-releases-2025-yearbook-showcasing-2024-vc-trends/">much different than</a></strong> the U.S. where <strong>57%</strong> of <em><strong>total worldwide deal value</strong></em> was accounted for via the US in 2024, at an estimated <strong>$215.4 billion</strong>. Bringing it to AI and Cyber in particular, AI dominated security investments across stages in 2024, as laid out by my friend Mike Privette of <strong><a href="https://www.returnonsecurity.com/p/the-state-of-the-cybersecurity-market-in-2024">Return on Security</a></strong>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TRqn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TRqn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 424w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 848w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 1272w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TRqn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png" width="599" height="334.0576923076923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:812,&quot;width&quot;:1456,&quot;resizeWidth&quot;:599,&quot;bytes&quot;:465798,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TRqn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 424w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 848w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 1272w, https://substackcdn.com/image/fetch/$s_!TRqn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2445864d-a13a-4565-96e3-a4ecc32786b6_1588x886.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Going back to the US AI Action plan, it lays out key policy actions to reduce red tape, such as:</p><ul><li><p>Looking to remove current Federal regulations that hinder AI innovation and adoption</p></li><li><p>Work with Federal agencies to identify, revise and repeal regulations that hinder AI development or deployment</p></li><li><p>Consider a state&#8217;s AI regulatory climate when making Federal funding decisions (more on this topic later)</p></li></ul><p>There&#8217;s also an emphasis on ensuring Frontier AI protects free speech and American values, which includes revising the NIST AI RMF to eliminate references to DEI, Misinformation and Climate Change. </p><h3>Encouraging Open-Source and Open-Weight AI</h3><p>This section of the first pillar I found particularly interesting, for reasons I will discuss below. The section emphasizes the importance of open source/weight models when it comes to not being dependent on a provider, and also allowing organizations with sensitive data to use models without needing to send their data to the provider for example. </p><p>This speaks to platforms such as HuggingFace and the rise of open source/weight AI models, allowing transparency and visibility that isn&#8217;t freely available with commercial AI models and providers. That said, there are risks with open source/weight models too, much like open source software itself, given how expansive and complex the ecosystem is.</p><p>This is a nuanced topic, because similar arguments were made about Cloud in the early days, but now the US Department of Defense, Intelligence Community now routinely run sensitive workloads in hyperscale cloud environments, albeit with proper measures such as encryption, to protect data from being disclosed to the providers without authorization, building on compliance programs such as FedRAMP and the DoD Cloud Security Requirements Guide (SRG) and Impact Levels, for different classifications and data sensitivities.</p><p>What makes this section interesting too is that the <strong><a href="https://www.reuters.com/business/autos-transportation/us-department-defense-awards-contracts-google-xai-2025-07-14/">DoD recently awarded</a></strong> contracts to leading proprietary commercial model providers, such as OpenAI, Google, Anthropic and xAI, up to $200M each, to scale up adoption of advanced AI capabilities in the DoD. These of course are commercial model providers that don&#8217;t necessarily have the same level of transparency as open-source/weight models that the AI Action Plan emphasizes. </p><p>I recently sat down with Daniel Bardenstein to dive into the complexities of the AI supply chain, including discussing the differences between commercial and open source models when it comes to code and weights. </p><div id="youtube2-ZQ-qHVMJA9U" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ZQ-qHVMJA9U&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ZQ-qHVMJA9U?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>All this said, this section of the AI Action plan does emphasize the importance of open source/weight models, and this includes the rise of platforms such as HuggingFace.</p><p>From a policy perspective, the AI Action Plan includes actions such as improving access to compute for startups and academics, driving adoption of open source/weight models by SMBs and more. </p><h4>Enabling AI Adoption</h4><p>An interesting aspect of the AI Action plan is that it doesn&#8217;t just take aim at the Federal landscape, but commercial industry too, with a section focused on accelerating adoption of AI among established large enterprise organizations. </p><p>On one hand, this can be seen as the Federal government looking to accelerate the US adoption of a transformative technology, given how pivotal the administration views it to economic and national security, but on the other, I could see some making the point that this is looking to drive spending and consumption of technologies and companies, some of whom have close relationships with the current administration, as well as are financially backed by venture capitalists who do. </p><p>To help accelerate adoption the AI Action plan has policy actions such as establishing AI Centers of Excellence (AI CoE)&#8217;s, launching domain-specific efforts to measure/demonstrate the productivity boost of AI and also use the DoD, IC and ODNI to measure US adoption contrasts with competitor nations. </p><h3>Improving the Understanding, Control and Robustness of AI and LLMs</h3><p>The Action Plan also specifically calls out the current challenges in understanding how frontier AI models work. It is well known that we currently do not thoroughly understand why a model produces a specific output for example. This is problematic for many use cases, including cybersecurity, especially when it comes to adoption in industry&#8217;s such as Defense, National Security and Intelligence. </p><p>The Action Plan calls on DARPA in collaboration with others to spearhead research to understand the interpretability and robustness of AI and frontier models as well as building out an AI evaluation ecosystem, to help measure AI reliability and performance, which is also critical as we look to weave these technologies into everything from consumer goods to critical infrastructure and defense systems. </p><h3>Increased Adoption Throughout Federal and Defense Agencies</h3><p>This administration has already made it clear how critical they view AI, not just for commercial purposes but also Federal agencies, civilian services and national security. I mentioned earlier the multi-million dollar contracts being awarded to the frontier model providers such as OpenAI, Anthropic, Google and others and the Action Plan highlights the need to accelerate adoption of AI in Government and the DoD. </p><p>This includes taking aim at manual internal processes and improved citizen and national security outcomes. Anyone who has been around Federal/DoD cybersecurity knows it is rife with opportunities to streamline and accelerate, whether it is currently manual and cumbersome compliance processes, enterprise SOC environments and threat hunting, vulnerability management and more. </p><p>The DoD&#8217;s IT and Cyber executives already have efforts underway to leverage AI to transform existing manual cumbersome compliance processes, such as the DoD Software Fast Track (SWFT) initiative, which I covered in the article &#8220;<strong><a href="http://Buckle Up For the DoD's Software Fast Track ATO (SWFT)">Buckle Up for the DoD&#8217;s Software Fast Track ATO (SWFT)</a></strong>.&#8221;</p><p>These use cases have commercial equivalents and this is why we&#8217;ve seen a wave of AI security startups looking to tackle systemic cybersecurity issues through AI-native capabilities and products. </p><p>I&#8217;ve covered the intersection of AI and Cyber extensively, but a couple of my resources I primarily recommend include:</p><ul><li><p><strong><a href="https://www.resilientcyber.io/p/securitys-ai-driven-dilemma">Security&#8217;s AI-Driven Dilemma</a></strong></p></li><li><p><strong><a href="https://www.resilientcyber.io/p/agentic-ais-intersection-with-cybersecurity">Agentic AI&#8217;s Intersection with Cybersecurity</a></strong></p></li></ul><h2>Pillar II: Build American AI Infrastructure</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y6j5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y6j5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 424w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 848w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y6j5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png" width="1456" height="571" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:571,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4934802,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y6j5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 424w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 848w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 1272w, https://substackcdn.com/image/fetch/$s_!y6j5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cea26c2-76b5-4f47-b262-53e225367fe3_2576x1010.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While topics such as the potential value and ramifications across society of AI adoption are exciting, one truth is fundamental, none of it can run without a sufficient underlying infrastructure. </p><p>While estimates vary, <strong><a href="https://energy.mit.edu/news/the-multi-faceted-challenge-of-powering-ai/">studies project</a></strong> that U.S. data centers already consume more than <strong>4%</strong> of the nations total electricity and it is set to rise to nearly <strong>10%</strong> or more by 2030. Industry leaders such as Sam Altman of OpenAI and Andy Jassy of Amazon have <strong><a href="https://www.promarket.org/2024/09/12/the-us-is-not-prepared-for-the-ai-electricity-demand-shock/">each made public remarks</a></strong> about the energy constraints and the need for an &#8220;energy breakthrough&#8221; to power the future demands driven by AI growth and adoption. </p><p>Tying back to the &#8220;Winning the AI Race&#8221; event hosted by All-In, you can listen to this clip below which includes commentary from the Secretary of the Interior as well as the Energy Secretary each discussing the current and future energy demands of the U.S. tied to AI, and what steps need to be taken and how the Action Plan addresses those.</p><div id="youtube2-jp9jDINt1mM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;jp9jDINt1mM&quot;,&quot;startTime&quot;:&quot;1072&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/jp9jDINt1mM?start=1072&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Not to make everything about China, but various speakers, including President Trump commented on the pace at which China is expanding their energy capacity (often through Coal) and how the U.S. is far behind China&#8217;s growth in terms of energy capabilities, and that must change, if we want to keep pace with AI, which has such strong energy demands. </p><p>This second pillar of the AI Action Plan covers key activities to facilitate the energy demands, such as:</p><ul><li><p><strong>Creating streamlined permitting for Data Centers, Semiconductor Manufacturing Facilities, and Energy Infrastructure </strong></p></li><li><p><strong>Developing a Grid to Match the Pace of AI Innovation</strong></p></li><li><p><strong>Restoring American Semiconductor Manufacturing</strong></p></li><li><p><strong>Building High-Security Data Centers for Military and Intelligence Community Usage</strong></p></li><li><p><strong>Training a skilled workforce for AI Infrastructure</strong></p></li></ul><p>While I won&#8217;t comment as much about the above areas, both due to being outside of my area of expertise and also not as relevant to cybersecurity, I was pleased to see a specific carve out focusing on my wheelhouse:</p><h3>Bolster Critical Infrastructure Cybersecurity</h3><p>Before diving into the specifics of the AI Action Plan related to Critical Infrastructure and Cyber, let&#8217;s recap what the last year or more have involved when it comes to the intersection of these two topics. </p><p>The Critical Infrastructure Sectors, as identified by the Department of Homeland Security (DHS) can be seen below. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!547f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!547f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 424w, https://substackcdn.com/image/fetch/$s_!547f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 848w, https://substackcdn.com/image/fetch/$s_!547f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 1272w, https://substackcdn.com/image/fetch/$s_!547f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!547f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png" width="523" height="386.14354395604397" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1075,&quot;width&quot;:1456,&quot;resizeWidth&quot;:523,&quot;bytes&quot;:1787865,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!547f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 424w, https://substackcdn.com/image/fetch/$s_!547f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 848w, https://substackcdn.com/image/fetch/$s_!547f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 1272w, https://substackcdn.com/image/fetch/$s_!547f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19cadfd3-4c1e-409e-8661-45fcbcb3a125_1986x1466.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>All of these sectors actively deal with cyber threats of some sort and many have been impacted by security incidents. This includes:</p><ul><li><p>Massive IP and sensitive data theft across the Defense Industrial Base (DIB), as <strong><a href="https://www.defense.gov/News/Transcripts/Transcript/Article/3723817/defense-industrial-base-cybersecurity-strategy-off-camera-on-the-record-media-r/">nation states and hackers target the DoD&#8217;s &#8220;Soft Underbelly</a></strong>&#8221;</p></li><li><p><strong><a href="https://www.frameworksec.com/post/inside-the-largest-u-s-telecom-cyber-breach-youve-probably-never-heard-of">The largest U.S. Telecommunications hacks in history as recently as 2024</a></strong></p></li><li><p><strong><a href="https://wisdiam.com/publications/recent-cyber-attacks-water-wastewater/">Cyber incidents impacting water facilities</a></strong></p></li><li><p><strong><a href="https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years">Incidents impacting U.S. fuel and oil sectors</a></strong></p></li><li><p><strong><a href="https://www.gao.gov/cybersecurity">Countless incidents involving Government facilities</a></strong></p></li><li><p><strong><a href="https://abcnews.go.com/US/emergency-services-target-cyberattacks-warns-dhs/story?id=109348647">Cyber attacks against emergency services</a></strong></p></li><li><p><strong><a href="https://www.cybersecuritydive.com/news/fbi-china-hackers-us-critical-infrastructure/706307/">Foreign nations burrowing and embedding themselves in U.S. energy systems</a></strong></p></li></ul><p>The Action Plan acknowledges the capability and value of AI systems from coding and software engineering and the potential for AI to enable cyber defensive tools and also bolster organizational defenses in the face of advanced threats, especially for organizations lacking financial resources and deep cyber expertise, which includes many organizations in the critical infrastructure sectors. </p><p>That said, as is the nature of AI and any technology, it is a double edged sword, both offering opportunities as well as obstacles. Adversaries are actively using AI to improve there malicious activities, and the AI Action Plan acknowledges this. It calls for use of AI in Critical Infrastructure to ensure the use of Secure-by-Design, Robust and Resilience AI systems that can also detect performance issues, malicious activities or data poisoning and other AI-direct attack vectors. </p><p>Some of the recommended policy actions here include establishing AI-ISAC&#8217;s, having DHS issue and maintain guidance to sector entities on addressing AI-specific vulnerabilities and threats, as well as enabling information sharing and collaboration between public and private sector organizations about known AI vulnerabilities, leaning into existing cyber vulnerability sharing pathways. </p><h3>Promote Secure-by-Design AI Technologies and Applications</h3><p>The AI Action plan also specifically calls out the promotion and use of Secure-by-Design AI Technologies and Applications. For those unfamiliar with the concept of Secure-by-Design, it has most recently been championed by CISA, and I have covered it extensively in previous pieces, such as:</p><ul><li><p><strong><a href="https://www.resilientcyber.io/p/the-elusive-built-in-not-bolted-on">The Elusive Built-in Not Bolted On</a></strong></p></li><li><p><strong><a href="https://www.resilientcyber.io/p/secure-by-design-and-demand">Secure-by-Design (and Demand) </a></strong></p></li><li><p><strong><a href="https://www.resilientcyber.io/p/secure-by-design-vs-secure-by-default">Secure-by-Design vs. Secure-by-Default: What&#8217;s the Difference?</a></strong></p></li><li><p><strong><a href="https://www.resilientcyber.io/p/secure-by-design-delusions">Secure-by-Design Delusions</a></strong></p></li></ul><p>While I&#8217;m a big proponent of Secure-by-Design and the value it brings the ecosystem, I also openly acknowledge the challenges, most notable the competing prioritization it presents businesses, over other goals, such as speed to market and revenue, which much to the dismay of security practitioners, will always take the drivers seat over any security aspirations a business has.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BLs7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BLs7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 424w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 848w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 1272w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BLs7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png" width="309" height="345.0782967032967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1626,&quot;width&quot;:1456,&quot;resizeWidth&quot;:309,&quot;bytes&quot;:3113015,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BLs7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 424w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 848w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 1272w, https://substackcdn.com/image/fetch/$s_!BLs7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53e8be74-66e7-4099-a168-c73092ea40ff_1594x1780.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI will inevitably face this same dilemma. That said, to help promote the Secure-by-Design AI Technologies and Applications the recommended policy actions include refining the DoD&#8217;s Responsible AI and GenAI Frameworks, Roadmaps and Toolkits, and also publishing an AI Assurance IC Standard. </p><h3>Promote Mature Federal Capacity for AI Incident Response</h3><p>Like any other technology, no matter how great your defenses, incidents will inevitably occur, making incident response absolutely critical. The Federal government realizes this, and that CISA in collaboration with other agencies and private sector partners <strong><a href="https://www.cisa.gov/news-events/news/cisa-jcdc-government-and-industry-partners-conduct-ai-tabletop-exercise">held an inaugural tabletop exercise</a></strong> focused on AI security incidents. This was led by amazing security leaders such as Jen Easterly and others. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://www.cisa.gov/sites/default/files/2024-06/June_13_TTX_Plan_508c.pdf" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lq_-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 424w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 848w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 1272w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lq_-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png" width="528" height="160.28571428571428" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:442,&quot;width&quot;:1456,&quot;resizeWidth&quot;:528,&quot;bytes&quot;:664703,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.cisa.gov/sites/default/files/2024-06/June_13_TTX_Plan_508c.pdf&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lq_-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 424w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 848w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 1272w, https://substackcdn.com/image/fetch/$s_!Lq_-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fab1144e1-b469-4e06-bdcd-cbf703262118_1496x454.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>CISA through its Joint Cyber Defense Collaborative (JCDC) even published the <strong><a href="https://www.cisa.gov/sites/default/files/2024-06/June_13_TTX_Plan_508c.pdf">AI Tabletop Exercise scenario document</a></strong>, outlining exercise purpose, objections, scenarios and more - all of which private sector organizations can use to inform their own AI incident response exercises and activities, and agencies can use to inform future maturity around AI incident response. </p><p>The tabletop resource asks a great series of questions that can help organizations reflect on their AI incident response processes and capabilities, or lack thereof. </p><p>Policy actions to mature the Federal capacity for AI IR include ensuring NIST and others include AI in the establishment of standards, response frameworks and best-practices. It also calls for CISA to update IR and vulnerability response playbooks to include considerations for AI systems, deeper collaboration between CISO&#8217;s and Chief AI Officers, as well as responsible sharing of AI vulnerability information through DoD, DHS and the Office of the National Cyber Director (ONCD), among others. </p><h2>Pilar III: Lead in International AI Diplomacy and Security</h2><p>A big emphasis, and rightfully so, throughout commentary by President Trump and others as part of the Winning the AI Race event, was the importance of adoption of American AI systems, computing hardware and standards. </p><p>The most poignant example of this is China&#8217;s <strong><a href="https://www.cfr.org/china-digital-silk-road/">Digital Silk Road (DSR) and larger Belt and Road Initiative (BRI)</a></strong>, which involves embedding Chinese technologies and infrastructure around the world, expanding China&#8217;s influence while also raising various concerns around cybersecurity and privacy. </p><p>The U.S. itself is currently <strong><a href="https://www.reuters.com/world/us/us-house-vote-provide-3-billion-remove-chinese-telecoms-equipment-2024-12-08/">going through major efforts</a></strong> to remove Chinese tech, such as Huawei and others, which is pervasive across many areas. </p><p>Efforts to exert this influence through digital technologies is well documented by organizations such as <strong><a href="https://www.atlanticcouncil.org/content-series/strategic-insights-memos/toward-a-coherent-framework-for-us-china-tech-competition-in-the-global-south/">The Atlantic Council</a></strong>. These influences and embedding of technology have not just cybersecurity and privacy implications, but also geopolitical and economic considerations as well. </p><p>Some of the key themes in the third pillar include:</p><ul><li><p>Exporting American AI to Allies and Partners</p></li><li><p>Countering Chinese Influence in International Governance Bodies</p></li><li><p>Strengthening AI Compute Export Control Enforcement</p></li><li><p>Plugging Loopholes in Existing Semiconducting Manufacturing Export Controls</p></li><li><p>Align Protection Measures Globally</p></li><li><p>Ensuring that the U.S. Government is at the Forefront of Evaluating National Security Risks in Frontier Models</p></li></ul><p>There&#8217;s a lot to unpack in this pillar due to the expansive focus areas but the key theme is exerting American influence to ensure American dominance in AI, which shouldn&#8217;t be surprising given that is a topic of the AI Action Plan itself, and also echoed in previous Trump EO&#8217;s focused on AI, such as &#8220;<strong><a href="https://www.whitehouse.gov/presidential-actions/2025/01/removing-barriers-to-american-leadership-in-artificial-intelligence/">Removing Barriers to American Leadership in AI&#8221;</a></strong>. </p><p>The U.S. is looking to establish a consortium from industry to create full-stack AI export packages. To indicates the U.S. tapping into its commercial tech sectors to help ensure U.S. technologies are pervasive around the globe among partners. The U.S. is also striving to align international AI governance approaches with American values and counter authoritarian influence. This may be challenging given how increasingly far the U.S. and EU are growing apart when it comes to their regulatory and AI governance approaches, as I discussed above, albeit both entities oppose authoritarian influence, at least historically. </p><h3>Strengthen AI Compute Export Control Enforcement &amp; Plugging Loopholes in Semiconductor Manufacturing Export Controls</h3><p>The U.S. has taken a stance of pushing for export controls focused on limiting China&#8217;s access to advanced semiconductors and associated manufacturing equipment. The success of these efforts has been far from perfect though.</p><p>Just two days ago, <strong><a href="https://www.cnbc.com/2025/07/24/nvidia-ai-chips-smuggling-china-trump.html">news broke</a></strong> that at least $1 billion of NVIDIA AI chips illegally entered China, as well as commentary from NVIDIA&#8217;s CEO Jensen Huang that they would resume selling H20 chips to China. It is also widely reported that China has worked around these restriction mechanisms through pathways such as smuggling networks, transit points in bordering nations such as Vietnam, Taiwan and Singapore, relying on front companies and also utilizing offshore AI services and data centers, all in attempts to succeed in their AI ambitions despite these export controls from the U.S. </p><p>Additionally, they often say necessity is the mother of invention, and one stark example of that is the Chinese AI company DeepSeek. DeepSeek-R1&#8217;s launch <strong><a href="https://www.today.com/video/deepseek-new-ai-assistant-from-china-rattles-us-markets-230443589556">rattled U.S. markets</a></strong>, leading to a <strong><a href="https://www.youtube.com/watch?v=Yhk1YTK0dsQ">tech sector sell off</a></strong>, including the <strong><a href="https://finance.yahoo.com/news/chinese-ai-startup-deepseek-rattling-171500752.html">Nasdaq dropping 3.6%~ and the S&amp;P 500 falling 1.8%</a></strong>. DeepSeek has a focus on efficiency with their LLMs, including lower resource requirements and innovative architectural approaches, which some speculate is a direction taken due to the difficulty in acquiring leading AI chips due to the export controls mentioned above.</p><p>The AI Action Plan seeks to strengthen these export controls, as well as plug loopholes in existing controls, such as targeting component sub-systems rather than just major systems necessary for semiconductor manufacturing. </p><p>Many have raised cybersecurity concerns around the DeepSeek models, discussed in <strong><a href="https://www.csis.org/analysis/delving-dangers-deepseek">this Center for Internet Security (CSIS) article</a></strong>, with some nations outright banning their use, and the U.S. some Federal agencies instructing employees against using it due to national security concerns. Despite those concerns, <strong><a href="https://www.wiz.io/reports/the-state-of-ai-in-the-cloud-2025">research from industry leaders such as Wiz</a></strong> earlier this year showed rapid adoption of DeepSeek-R1, with it quickly approaching 10% among self-hosted AI models. <strong><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz also found exposed</a></strong> DeepSeek databases leaking sensitive information, including chat histories. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h5nF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h5nF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 424w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 848w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 1272w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h5nF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png" width="529" height="396.75" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:529,&quot;bytes&quot;:414278,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h5nF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 424w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 848w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 1272w, https://substackcdn.com/image/fetch/$s_!h5nF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc01c9cea-a4cb-4dad-be68-4917316e2ee5_2024x1518.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The AI Action plan also aims to align International partners with the U.S. approach, and even calls for the U.S. to use methods such as secondary tariffs to achieve greater international alignment. Tariffs of course have been a hot topic in 2025, and this indicates the U.S. is willing to use economic incentives and policies to exert its influence globally in efforts to stymie China&#8217;s access to AI related technologies and equipment. </p><p>Another area of the AI Action Plan that highlights cybersecurity risks discusses evaluating national security risks in frontier models. This includes assessing potential security vulnerabilities as well as foreign influence from the use of adversaries AI systems in critical infrastructure as well as in the broader U.S. economy. </p><p>While not specific to AI, this aligns with <strong><a href="https://defensescoop.com/2025/07/23/hegseth-dod-cio-cloud-tech-supply-chain-order-microsoft-china">recent headlines</a></strong> where the Defense Secretary Pete Hegseth <strong><a href="https://defensescoop.com/wp-content/uploads/sites/8/2025/07/1753273552292.pdf">issued a directive ordering</a></strong> the DoD CIO to take additional measures to ensure DoD technology in protected from the influence of top adversaries. Ironically, this came after news broke that one of the DoD&#8217;s largest tech vendors, Microsoft, was relying on China-based engineerings to support U.S. DoD cloud environments.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s-Uu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s-Uu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 424w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 848w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 1272w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s-Uu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png" width="507" height="573.4798270893372" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1570,&quot;width&quot;:1388,&quot;resizeWidth&quot;:507,&quot;bytes&quot;:1301758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/169143874?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s-Uu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 424w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 848w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 1272w, https://substackcdn.com/image/fetch/$s_!s-Uu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F908b0a43-1334-4fc6-ab77-37b0d869a01b_1388x1570.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is where things get problematic, given some of the DoD&#8217;s largest IT vendors are also global technology giants with footprints around the world and complex supply chains, relationships and competing priorities, often pitting themes of economics and profits against the backdrop of national security interests. </p><h1>Closing Thoughts</h1><p>The U.S. AI Action Plan is ambitious and brings together various things that are critical to ensuring U.S. dominance when it comes to AI. These include economics, capital, incentives, energy demands, model development and adoption, and cybersecurity. </p><p>All of the topics are underpinned by geopolitics, especially as the world two leading nations on the AI front continue to race for supremacy, allocating investments, aligning their national policies accordingly and looking to exert influence globally to ensure their interests thrive. </p><p>It remains to be seen how much of the action plan materializes, especially given it will face some challenges due to recent Federal workforce restructuring, RIFs and budgetary cuts, some also speculate the very technology itself will help address some of these challenges.</p><p>For those in the software and cybersecurity communities, while the AI Action Plan is produced by the government, its ambitions and intentions expand well beyond the U.S. Federal government into the entire nations economic prosperity and national security.</p><p>We need to be producing the most innovative and capable AI software, products and models, as well as leveraging this transformative technology to both address longstanding systemic cybersecurity challenges such as vulnerability management, application security, workforce shortfalls and more, while also leaning into best practices and guidance from sources such as NIST, OWASP and others to ensure we secure AI itself and don&#8217;t make the U.S. critical infrastructure and commercial attack surface more porous than it already is. </p><blockquote><p><strong>We&#8217;re in this together, for better or worse.</strong></p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber #57]]></title><description><![CDATA[Stuxnet - 15 Years Later, Looming AI Cyber Exits, The U.S. AI Action Plan, Better AGAINST AI Agents, FedRAMP VulnMgt Evolution, & MSFT Security Woes (Again)]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-57</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-57</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 24 Jul 2025 14:35:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!d-7z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome</h1><p>Welcome to issue #57 of the Resilient Cyber Newsletter. </p><p>It&#8217;s been quite the week, with reflections on Stuxnet and the state of IT/OT security, discussions/rumors around Israeli AI Cyber exists, the White House unveiling the U.S. AI Action Plan, FedRAMP dropping modernized continuous vulnerability management publications, and Microsoft incidents impacting the industry (again). </p><p>So, let&#8217;s go get going, because we have a lot of ground to cover!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d-7z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d-7z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 424w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 848w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 1272w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d-7z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png" width="531" height="380.2313019390582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1034,&quot;width&quot;:1444,&quot;resizeWidth&quot;:531,&quot;bytes&quot;:2151652,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d-7z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 424w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 848w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 1272w, https://substackcdn.com/image/fetch/$s_!d-7z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6061b3ec-0382-47f1-9d0a-fdadd740abcd_1444x1034.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2lRB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2lRB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 424w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 848w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 1272w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2lRB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png" width="506" height="84.33333333333333" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:506,&quot;bytes&quot;:14225,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2lRB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 424w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 848w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 1272w, https://substackcdn.com/image/fetch/$s_!2lRB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdff11fac-8e93-4be7-b802-4805613edfb2_1200x200.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><strong>Security Leaders Trust Absolute Security for Endpoint Resilience</strong></h3><p>Between cyberattacks, outages, and hybrid work, it&#8217;s a struggle to keep devices secure, compliant, and operational. Blind spots create risk, and manual remediation slows things down.</p><p>Absolute Secure Endpoint 10 introduces <a href="https://www.absolute.com/resources/data-sheets/absolute-ai-assistant?utm_source=partn%5b%E2%80%A6%5dog-day-product-launch-2025&amp;utm_content=absolute_ai_assistant">AI-powered Assistant</a> for automated workflows and <a href="https://www.absolute.com/resources/data-sheets/customizable-dashboards?utm_source=par%5b%E2%80%A6%5d-day-product-launch-2025&amp;utm_content=customizable_dashboards">Customizable Dashboards</a> for deeper insights to improve productivity and reduce risk. <a href="https://www.absolute.com/resources/data-sheets/required-applications?utm_source=partn%5b%E2%80%A6%5doduct-launch-2025&amp;utm_content=absolute_required_applications">Required Applications</a> (coming soon) ensures critical tools are in place and configured to optimize compliance.</p><p>With self-healing capabilities rooted in firmware, Secure Endpoint 10 revolutionizes endpoint control, security, and resilience from the core.&nbsp;</p><p>Take control of your cyber resilience strategy today.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.absolute.com/blog/introducing-the-absolute-secure-endpoint-10-release?utm_source=partnership&amp;utm_medium=syndication&amp;utm_campaign=groundhog-day-product-launch-2025&amp;utm_content=introducing_the_absolute_secure_endpoint_10_release&quot;,&quot;text&quot;:&quot;Explore Secure Endpoint 10&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.absolute.com/blog/introducing-the-absolute-secure-endpoint-10-release?utm_source=partnership&amp;utm_medium=syndication&amp;utm_campaign=groundhog-day-product-launch-2025&amp;utm_content=introducing_the_absolute_secure_endpoint_10_release"><span>Explore Secure Endpoint 10</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.crowdstrike.com/en-us/blog/reflecting-on-building-resilience-by-design/">One Year Later: Reflecting on Building Resilience by Design</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mwUy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mwUy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 424w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 848w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 1272w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mwUy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png" width="386" height="274.37802907915994" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:880,&quot;width&quot;:1238,&quot;resizeWidth&quot;:386,&quot;bytes&quot;:971406,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mwUy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 424w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 848w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 1272w, https://substackcdn.com/image/fetch/$s_!mwUy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00c86e6a-17bc-412e-8d5c-00eff0975fac_1238x880.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We recently passed the one-year mark (July 19th) of the infamous CrowdStrike incident, which impacted organizations worldwide, from IT firms to airlines. It was one of the most significant IT incidents in recent memory, and the vendor at the center of it, CrowdStrike, recently shared a blog covering some of the key efforts and changes they&#8217;ve made in the past year.</p><p>This includes a three-pillared approach to Resilience-by-Design, across Foundational Adaptive and Continuous improvement. They go on to discuss their sensor and content safety, standards for customer control, and infrastructure and operational excellence. </p><h3><a href="https://www.calcalistech.com/ctechnews/article/xgkjv7ipy">How AI and Outsourcing Are Killing Junior Jobs</a></h3><p>We continue to hear about AI's impact on the workforce, predominantly white-collar jobs. That impact is disproportionately impacting junior roles in the workforce so far. This article from CTECH appears to emphasize that point, stating:</p><blockquote><p><strong>"Only 360 junior employees entered Israel&#8217;s high-tech industry last year, out of approximately 6,500 university graduates who complete relevant degrees each year.&#8221;</strong></p></blockquote><p>The article cites findings from Israel&#8217;s Employment Service, which revealed that the number of job seekers in high-tech professions has more than doubled, from 7,000 in January 2019 to 15,00 in April 2025. It says these figures don&#8217;t typically include entry-level candidates, indicating the figures may be even worse. </p><p>The article goes on to discuss a lack of programs for employees to hire and train entry-level talent, as well as increased use of AI or aspirations to do so, which is causing companies to slow down hiring to evaluate whether AI could potentially do the work of some of these junior roles. That said, it also makes the point that junior talent are often &#8220;AI natives&#8221; and are not only introducing AI to teams but teaching senior staff how to use it. </p><p>It&#8217;s worth noting that this article refers to Israel, not the U.S. Still, it does represent a microcosm of a larger discussion about the intersection of AI, economics, and the workforce. </p><p>It does remind me of comments of Dirty Jobs host Mike Rowe, who discusses the unintended workforce impacts of driving kids away from aspiring towards blue collar work and instead into tech, and the fact that AI isn&#8217;t quickly replacing Electricians, Plumbers, Linemen, and more, like it is with the white collar workforce. He cites quotes from folks like Larry Fink, who claim we need <em><strong>hundreds of thousands of Electricians</strong></em> and other similar blue-collar workers. </p><div id="youtube2-dHvN_gZLAQs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;dHvN_gZLAQs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/dHvN_gZLAQs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://homeland.house.gov/hearing/fully-operational-stuxnet-15-years-later-and-the-evolution-of-cyber-threats-to-critical-infrastructure">Stuxnet - 15 Years Later &amp; the Evolution of Cyber Threats to Critical Infrastructure</a></h3><p>This week the Committee on Homeland Security hosted a session reflecting on the 15 years since Stuxnet and the evolution of threats facing IT/OT environments. It featured witness testimony from industry leaders:</p><ul><li><p>Tatyana Bolton</p></li><li><p>Kim Zetter</p></li><li><p>Robert Lee</p></li><li><p>Nate Gleason </p></li></ul><p>I had a chance to listen to most of the session and there was a lot of great points made, ranging from the evolution of cyber threats and malware, the nuances of OT environments compared to IT, risks facing critical infrastructure, the need to sustain funding and support for CISA and much more. </p><p>This was very well done by Tatyana, Kim, Rob and Nate, attempting to explain complex cyber topics to a non-technical audience while not just raising awareness but garnering support for deeper commitments for cybersecurity. </p><div id="youtube2-jLROmU7j57Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;jLROmU7j57Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/jLROmU7j57Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://medium.com/@fry.rob.g/build-vs-buy-in-the-age-of-ai-a-new-equation-for-security-teams-dd3a1b9c60de">Build vs. Buy in the Age of AI: A New Equation for Security Teams</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Amfp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Amfp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 424w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 848w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 1272w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Amfp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png" width="467" height="239.27335164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:746,&quot;width&quot;:1456,&quot;resizeWidth&quot;:467,&quot;bytes&quot;:317806,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Amfp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 424w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 848w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 1272w, https://substackcdn.com/image/fetch/$s_!Amfp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F463cd07d-ac67-4024-92d9-fcd652837621_1492x764.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Does AI change the Build vs. Buy paradigm for security teams?<br><br>That's the intriguing question posed by <strong><a href="https://www.linkedin.com/in/ACoAAAC4s1UB-kZ398IQLCyZYNvClyCQAxnRwvw">Rob Fry</a></strong> in this piece. Historically, organizations have faced the Build vs. Buy dilemma, which often comes down to factors such as cost, internal expertise and competencies, total cost of ownership (TCO), and more. <br><br>With the rise of AI and LLM-driven development, some are revisiting this dilemma with fresh eyes and the ability to replicate vendor capabilities much easier than in the past. Rob raises a lot of thought-provoking questions and topics in the post.<br><br>That said, I still strongly think most organizations will rightfully opt to Buy vs. Build, due to building not being a core competency, and often a distraction from focusing on delivering value to stakeholders and customers, rather than leaning into innovative commercial offerings and capabilities. </p><p>In fact, I think AI will (and likely already is for some) lead to faster/short iterations among product versions and the ability to field customer requests into product backlogs, innovate and turn new capabilities around to customers faster than we have seen historically.</p><h3><a href="https://www.darkreading.com/vulnerabilities-threats/securing-budget-cybersecurity-return">Securing the Budget: Demonstrating Cybersecurity&#8217;s Return</a></h3><p>One of the most real challenges for CISOs and security leaders is demonstrating an ROI for cyber spend. This article from Kara Sprague, CEO of HackerOne dives into tying security investments into measurable business outcomes, including reduces breach likelihood and minimized financial impact to help align internal stakeholders when it comes to investing in cybersecurity. </p><p>Kara discusses why traditional ROI doesn&#8217;t cut it for cyber, due to distinct aspects of cyber. Whereas other areas such as product and sales focus on revenue generation, new customers and more, cyber is often measured based on risk/cost reductions and avoidance. It is akin to trying to prove a negative, and that is why it is easy to get lulled into a false sense of security. &#8220;We haven&#8217;t had an incident yet, so we must be spending enough&#8221;, is a common phrase rumbled. </p><h3><a href="https://www.calcalistech.com/ctechnews/article/sjkbto2igx">Wave of Israeli AI-Cyber Exits Looming?</a></h3><p>In the dust settling of the massive $700 Million Prompt AI acquisition by Palo Alto around RSA, something <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ed Sim&quot;,&quot;id&quot;:3093019,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/117206c8-d2bf-460a-bfe4-f63ab22b79d3_2917x3582.png&quot;,&quot;uuid&quot;:&quot;ad8f8e74-3ca4-449d-909a-d6c1502bddd4&quot;}" data-component-name="MentionToDOM"></span> and I discussed in an interview last week, there are now rumors that there may be other AI cyber exits on the horizon. </p><p>An article from CTech calls out other players such as Lasso, Aim, Pillar and Noma as the next potential targets in the hot Israeli AI cyber landscape as potential M&amp;A targets.</p><p>The article cites ZScaler and F5 as potential acquirers, looking to follow suit of PANW in terms of large AI acquisitions, to accelerate their role as becoming key players in the AI security space. This isn&#8217;t a surprise, given large incumbents are often faced with the Build vs. Buy paradigm when it comes to expanding into new categories, and it is often faster to acquire an innovative startup in the space than try and organically build the capability themselves. </p><p>These industry leaders, atop the cyber market through tremendous performance have &#8220;earned&#8221; the right to become a platform, as discussed by my friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;6fc5a73c-9ad9-463e-a6c7-d96da5a520a9&quot;}" data-component-name="MentionToDOM"></span> recently in a piece titled &#8220;<strong><a href="https://ventureinsecurity.net/p/you-dont-start-a-platform-you-earn">You don&#8217;t start a platform, you earn the right to become one</a></strong>&#8221;. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wumv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wumv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 424w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 848w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 1272w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wumv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png" width="503" height="409.7239010989011" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1186,&quot;width&quot;:1456,&quot;resizeWidth&quot;:503,&quot;bytes&quot;:937347,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wumv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 424w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 848w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 1272w, https://substackcdn.com/image/fetch/$s_!Wumv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1218d-99e1-4d2b-a7ca-0a8ad73b38cf_1912x1558.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The industry leaders such as PANW, ZScaler and F5 have all earned their stripes, starting with a core competency and are now rightfully expanding into AI security, which does and will include various subsets of capabilities itself, something broken down exceptionally well by <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;James Berthoty&quot;,&quot;id&quot;:215222117,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029c069a-0ea1-4c28-bedb-742a03fa770a_800x800.jpeg&quot;,&quot;uuid&quot;:&quot;d20ddddd-1193-4f2e-baaa-be3c2d07753a&quot;}" data-component-name="MentionToDOM"></span> in his &#8220;<strong><a href="https://pulse.latio.tech/p/2025-latio-ai-security-report">2025 Latio AI Security Report</a></strong>&#8221;, as shown below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rSOk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rSOk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 424w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 848w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 1272w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rSOk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png" width="419" height="468.33743409490336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1272,&quot;width&quot;:1138,&quot;resizeWidth&quot;:419,&quot;bytes&quot;:680508,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rSOk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 424w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 848w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 1272w, https://substackcdn.com/image/fetch/$s_!rSOk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc45f8922-1825-492b-9b5f-589b300c66be_1138x1272.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>James and I dove deep into this topic in an episode of Resilient Cyber titled &#8220;<strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-james-berthoty">Analyzing the AI Security Market</a></strong>&#8221;.</p><div id="youtube2-nJn6xKWYUiI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nJn6xKWYUiI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nJn6xKWYUiI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>AI</h1><h3><a href="https://www.whitehouse.gov/articles/2025/07/white-house-unveils-americas-ai-action-plan/">Winning the AI Race</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WHIs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WHIs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 424w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 848w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 1272w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WHIs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png" width="627" height="104.21291208791209" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:242,&quot;width&quot;:1456,&quot;resizeWidth&quot;:627,&quot;bytes&quot;:133190,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WHIs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 424w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 848w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 1272w, https://substackcdn.com/image/fetch/$s_!WHIs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9015333-9aa5-423d-9460-00eeb2bd27e6_2512x418.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong><a href="https://www.linkedin.com/company/the-white-house/">The White House</a></strong> recently unveiled "<strong><a href="https://www.whitehouse.gov/articles/2025/07/white-house-unveils-americas-ai-action-plan/">America's AI Action Plan</a></strong>." It's built around 3 pillars:<br><br>1&#65039;&#8419; Accelerating AI Innovation<br>2&#65039;&#8419; Building American AI Infrastructure<br>3&#65039;&#8419; Leading in International AI Diplomacy and Security<br><br>The plan contains a TON of interesting intersections around cybersecurity and national security, which are all underpinned by economic prosperity. <br><br>This plan also emphasizes the further bifurcation of approaches between the U.S. &lt;&gt; and EU, with one emphasizing removing barriers to innovation, unleashing economic opportunity, and the other pushing to be a regulatory superpower, and saying there will be "no pauses" on regulatory efforts, despite pleas from industry. <br><br>I'll be writing a much more detailed article on this, but whether you're an investor, founder, or practitioner in technology and cybersecurity, there's something here for you.</p><p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Chamath Palihapitiya&quot;,&quot;id&quot;:97776398,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b307cf2-75a9-4926-b469-de95691aa726_2289x2289.jpeg&quot;,&quot;uuid&quot;:&quot;f204b7a4-295b-4418-9562-731c47a7d277&quot;}" data-component-name="MentionToDOM"></span> and the crew at All-In recently helped facilitate a &#8220;Winning the AI Race&#8221;, featuring speakers across Government and industry, including comments from President Trump himself on the AI Action plan.</p><div id="youtube2-HmxbPH1PL_A" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;HmxbPH1PL_A&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/HmxbPH1PL_A?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://utkarshkanwat.com/writing/betting-against-agents/">Why I&#8217;m Betting Against AI Agents in 2025 (Despite Building Them)</a></h3><p>The industry fervor around Agentic AI continues to be at a fever pitch, with VC firms dubbing 2025 the &#8220;year of agents&#8221; and the ecosystem seeing both a lot of capital allocated to Agentic AI startups, as well as founders and incumbents focusing on this space. </p><p>That said, this piece from Utkarsh Kanwat is a thoughtful counter-piece around the Agentic AI hype and its coming. from someone who has built 12+ production AI agent systems. Utkarsh mentions that they&#8217;ve built agents for a variety of purposes including Development, Data &amp; Infrastructure and Quality &amp; Process Agents. </p><p>He goes on to lay out three hard truths about AI agents:</p><ul><li><p>Error rates compound exponentially in multi-step workflows. 95% reliability per step = 36% success over 20 steps. Production needs 99.9%+.</p></li><li><p>Context windows create quadratic token costs. Long conversations become prohibitively expensive at scale.</p></li><li><p>The real challenge isn't AI capabilities, it's designing tools and feedback systems that agents can actually use effectively.</p></li></ul><p>There&#8217;s a helpful diagram showing how multi-step agents fail with the increased number of steps necessary:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qR8T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qR8T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 424w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 848w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qR8T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png" width="645" height="402.6820054945055" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:909,&quot;width&quot;:1456,&quot;resizeWidth&quot;:645,&quot;bytes&quot;:310212,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qR8T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 424w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 848w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!qR8T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4bed8487-9991-40c0-b124-2f8d22690215_2220x1386.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>He points out that production systems need 99.9%+ reliability and if each step in a agent workflow has 95%~ reliability and each step (as seen below) diminishes the success rate, this poses a real problem for all the claims and hopes around multi-agent multi-step workflows, especially in the context of Services-as-a-Software and those who are looking to have AI and Agents augment and replace human labor. </p><ul><li><p>5 steps = 77% success rate</p></li><li><p>10 steps = 59% success rate</p></li><li><p>20 steps = 36% success rate</p></li></ul><p>Key characteristics for a successful agentic system includes bounded contexts, verifiable operations and human decision points (sometimes) at critical junctions. He explains that when you stray from these themes the math simply works against a successful agentic workflow and implementation. </p><p>Another excellent point made is the token economics, using conversational agents as an example of how it doesn&#8217;t scale:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I5mG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I5mG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 424w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 848w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 1272w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I5mG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png" width="1456" height="918" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:918,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:299964,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!I5mG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 424w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 848w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 1272w, https://substackcdn.com/image/fetch/$s_!I5mG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ee47403-fcb1-4b97-8585-ffe10c145026_2296x1448.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The more turns in the conversation the higher the costs. While this article isn&#8217;t focused on security, you can see how this would play out if you look at SecOps, AppSec, or GRC as cyber specific examples. For example, using conversational agents for threat hunting, compliance assessments and remediations, vulnerability management and more will likely require multi-turn conversations that could have token based economic implications that make them unfeasible or expensive. </p><p>One thing I thought was interesting was this statement:</p><blockquote><p><strong>&#8220;The most success agents in production aren&#8217;t conversational at all. They&#8217;re smart, bounded tools that do one thing well and get out of the way&#8221;</strong></p></blockquote><p>This makes me think we will most certainly see agent &#8220;sprawl&#8221; to come, with agents exponentially outnumbering human users, and create the strong need for agentic governance as well as tackling problematic topics such as agentic IAM, zero trust and threats pointed out in OWASP&#8217;s Agentic AI Threats and Mitigations publication.</p><p>The author also highlights challenges he dubs the &#8220;tool engineering reality wall&#8221;, where he discusses the need to have effective tool design, accounting for factors such as not overwhelming context windows, agents knowing if operations fully or partially succeeded, communicating state changes without burning tokens and much more. </p><p>Another excellent point raised is the &#8220;integration reality check&#8221;, where he highlights the complexity of integrating agents with enterprise systems, such as a lack of clean API&#8217;s, partial failure modes, authentication flow complexity, rate limits and more. I particularly thought this line jumped out:</p><blockquote><p><strong>&#8220;The companies promising "autonomous agents that integrate with your entire tech stack" are either overly optimistic or haven't actually tried to build production systems at scale. Integration is where AI agents go to die.&#8221;</strong></p></blockquote><p>The article isn&#8217;t all doom and gloom though, and highlights why the dozen agentic systems he&#8217;s built do work, which includes key aspects such as:</p><ul><li><p>Humans reviewing UX generated interfaces before deployment</p></li><li><p>Humans maintaining control over the integrity of database integrity</p></li><li><p>Defining discrete, well-scoped tasks </p></li><li><p>Leverage robust deployment pipelines with review and analysis prior to deployment </p></li><li><p>Having functional rollback mechanisms in place</p></li></ul><p>The author suspects venture-funded &#8220;fully autonomous agent&#8221; startups will hit economic walls, as they struggle to scale beyond demos, adoption will stagnate when it comes to real workflows, and the real winners will be those building &#8220;constrained, domain-specific tools that use AI for hard parts while maintaining human control or strict boundaries over critical decisions&#8221;. </p><p>While many may disagree with this piece, I thought it was a reasoned insightful rebuttal to the current bubble and hype. This isn&#8217;t to say agentic AI isn&#8217;t without its promise and potential, but it is clearly not without its problems either.</p><p>The piece closes recommending building the right way, with these key principles</p><ul><li><p>Defining clear boundaries</p></li><li><p>Designing for failure</p></li><li><p>Solving the economics</p></li><li><p>Prioritizing reliability over autonomy</p></li><li><p>Building on solid foundations</p></li></ul><h3><a href="https://www.linkedin.com/pulse/enterprise-challenges-mcp-adoption-christian-posta-8ucic/">Enterprise Challenges with MCP Adoption</a></h3><p>We continue to see widespread excitement around Agentic AI and protocols such as MCP. That said, the security community has raised concerns around IAM, inherent gaps in the original spec and more. </p><p>One of those folks include Christian Posta, who previously had written <strong><a href="https://blog.christianposta.com/the-updated-mcp-oauth-spec-is-a-mess/">how the MCP spec is for enterprises</a></strong>. That said, Christian recently wrote a great article discussing. that despite recent improvements around the MCP spec itself, enterprise challenges with adoption still remain, and key questions such as:</p><ul><li><p>How to onboard/register/discover MCP services</p></li><li><p>How much of the MCP authorization spec to adopt</p></li><li><p>How will they manage upstream API/service permissions and consent</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!seA-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!seA-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 424w, https://substackcdn.com/image/fetch/$s_!seA-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 848w, https://substackcdn.com/image/fetch/$s_!seA-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 1272w, https://substackcdn.com/image/fetch/$s_!seA-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!seA-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png" width="541" height="287.24346629986246" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:772,&quot;width&quot;:1454,&quot;resizeWidth&quot;:541,&quot;bytes&quot;:140651,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!seA-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 424w, https://substackcdn.com/image/fetch/$s_!seA-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 848w, https://substackcdn.com/image/fetch/$s_!seA-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 1272w, https://substackcdn.com/image/fetch/$s_!seA-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ca785b6-1441-41c7-acf4-9df1f71833ca_1454x772.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As Christian points out, it seems like every vendor is quickly standing up MCP servers, as are others across the Internet, and as it turns out, many are connecting to/with these servers with little consideration for the security implications of doing so. Much like SaaS, Christian says organizations should have a way to inventory and onboard new MCP connections and integrations as well as a method to assess and approve new MCP integrations for security risks. </p><p>Christian also lays out aspects of the MCP Authorization spec which MUST, and SHOULD be implemented:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9MOX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9MOX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 424w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 848w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 1272w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9MOX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png" width="581" height="318.6724960254372" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:690,&quot;width&quot;:1258,&quot;resizeWidth&quot;:581,&quot;bytes&quot;:125852,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9MOX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 424w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 848w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 1272w, https://substackcdn.com/image/fetch/$s_!9MOX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a5d12ae-5bc2-43ad-a122-74bc33accad8_1258x690.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As he closes with, MCP Services and the MCP protocol more broadly offer a lot of innovative opportunity for enterprises, but they aren&#8217;t without security implications to, and as they said, an ounce of prevention is worth a pound of cure, but this infers organizations actually take the time to thoughtfully and securely think through what they&#8217;re implementing and integrating with - which as we all know, isn&#8217;t likely, especially against the FOMO back drop around AI.</p><h1>AppSec, Vulnerability Management &amp; Supply Chain Security</h1><h3><a href="https://www.resilientcyber.io/p/fedramp-vulnerability-management">FedRAMP Vulnerability Management Evolution &#128640;</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!i1O2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!i1O2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 424w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 848w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 1272w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!i1O2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png" width="1456" height="202" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:202,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:239851,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!i1O2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 424w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 848w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 1272w, https://substackcdn.com/image/fetch/$s_!i1O2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84c5df85-63ca-4c83-b6dc-6baa7c06124a_1640x228.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>We recently saw <strong><a href="https://www.linkedin.com/company/gsa-fedramp/">FedRAMP&#174;</a></strong> release its Continuous Vulnerability Management RFC. It's a long-overdue evolution towards context-based vulnerability prioritization. This includes accounting for known exploitation, exploitability, and reachability, along with business context (e.g., criticality, compensating controls, etc.)</p><p>FedRAMP provides a summary and motivation of the RFC as laid out below:</p><div><hr></div><p><strong>This standard&#8217;s intent is to ensure providers promptly detect and respond to critical vulnerabilities by considering the entire context over Common Vulnerability Scoring System (CVSS) risk scores alone, prioritizing realistically exploitable weaknesses, and encouraging automated vulnerability management. It also aims to facilitate the use of existing commercial tools for cloud service providers and reduce custom government-only reporting requirements.</strong></p><div><hr></div><p>Gone are the days of prioritizing vulnerabilities based on legacy CVSS base scores without consideration for the above criteria. This wasted the time of developers and engineers and failed to remediate real organizational risks.<br><br>In this article, I break down the rise of CVEs contrasted against actual exploitation.I also dive into the use of reachability analysis for vulnerability prioritization, citing some of the helpful resources from my friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;James Berthoty&quot;,&quot;id&quot;:215222117,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029c069a-0ea1-4c28-bedb-742a03fa770a_800x800.jpeg&quot;,&quot;uuid&quot;:&quot;606cc72d-0c72-4387-9c54-e105e349daad&quot;}" data-component-name="MentionToDOM"></span>.<br><br>I discuss some of the innovative offerings from folks such as <strong><a href="https://www.linkedin.com/company/chainguard-dev/">Chainguard</a></strong> and <strong><a href="https://www.linkedin.com/company/endorlabs/">Endor Labs</a></strong> that allow teams to focus on their core competencies and deliver value to customers rather than vulnerability toil. I share the link to a live deep dive <strong><a href="https://www.linkedin.com/in/ACoAAAl42AwBq2qnHjbSQMEOHkWx0LVgL0lMXzg">Ron Harnik</a></strong> and I did on the FedRAMP RFC and vulnerability management more broadly.</p><div id="youtube2-wXtGh6pNQxI" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wXtGh6pNQxI&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wXtGh6pNQxI?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>This is great work by <strong><a href="https://www.linkedin.com/in/ACoAAABin2IBAe4X1OdNZa6a-AK5Hbhw5Yd0TgE">Pete Waterman</a></strong> and the FedRAMP team, and I'm glad to see them bring innovation to cloud security and compliance, and hope other compliance frameworks follow suit!</p><h3><a href="https://www.cnbc.com/2025/07/22/microsoft-sharepoint-chinese-hackers.html">Microsoft Software Being Exploited (Again)</a></h3><p>News broke this week that Chinese hackers were actively exploiting flaws in Microsoft&#8217;s software, this time in SharePoint. The activity involves Chinese APT&#8217;s dubbed &#8220;Linen Typhoon&#8221; and &#8220;Violet Typhoon&#8221; and involved on-premise versions of SharePoint, which have now had patches rolled out. </p><p>This comes on the heels of news in 2024 where U.S. government officials criticized Microsoft&#8217;s handling of the breach of U.S. government officials&#8217; email accounts, which included a once active Cyber Safety Review Board (CSRB) investigation of the Microsoft outlook incidents, but has been stalled due to political changes and impacts at CISA/DHS. </p><p>Microsoft also <strong><a href="https://www.cnbc.com/2025/07/18/microsoft-china-digital-escorts-pentagon.html">made headlines recently</a></strong> when ProPublica published an extensive report describing how MSFT was using engineers in China as part of its support for the U.S. DoD&#8217;s cloud Azure services, which is truly astounding when you realize this was happening at the same time as the MSFT Exchange incidents impacting the U.S. Government, CSRB investigation, inquiries from Congress on national security risks from MSFT and more. </p><p>All the while, MSFT has continued to receive large Federal/DoD IT contracts too, really calling into question the power of lobbying and the inability of the Government to change its purchasing patterns despite massive risks from one of its largest IT vendors. </p><p>The team at Rapid7 recently shared a <strong><a href="https://github.com/rapid7/metasploit-framework/pull/20409">Exploit module for Microsoft SharePoint ToolPane Unauthenticated RCE (CVE-2025-53770 and CVE-2025-53771</a>.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qO3D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qO3D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 424w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 848w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 1272w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qO3D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png" width="502" height="334.092032967033" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:314091,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qO3D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 424w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 848w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 1272w, https://substackcdn.com/image/fetch/$s_!qO3D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd12f38dd-f4f2-48c5-826d-64ab1726fbf3_2040x1358.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html">Google&#8217;s AI &#8220;Big Sleep&#8221; Discovers a Zero Day</a></h3><p>Google recently shared that their LLM-assisted vulnerability discovery framework &#8220;Big Sleep&#8221; helped discover a zero day impacting the SQLite open source database engine, prior to hackers being able to exploit it in the wild. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8AMn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8AMn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 424w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 848w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 1272w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8AMn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png" width="1456" height="768" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:648729,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168707245?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8AMn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 424w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 848w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 1272w, https://substackcdn.com/image/fetch/$s_!8AMn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f988876-60e5-4ac9-bc80-06a54c55a3fc_1620x854.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p><strong>"Through the combination of threat intelligence and Big Sleep, Google was able to actually predict that a vulnerability was imminently going to be used and we were able to cut it off beforehand," Kent Walker, President of Global Affairs at Google and Alphabet, <a href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/">said</a>.</strong></p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #56]]></title><description><![CDATA[Cyber Platform Dynamics, Services-as-a-Software Reflections, Impact of AI on Developer Productivity, FedRAMP Vulnerability Management Evolution, & Runtime Reachability Deep Dive]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-56</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-56</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 17 Jul 2025 13:40:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_TFS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to issue #56 of the Resilient Cyber Newsletter.</p><p>It&#8217;s been a really exciting past week with a lot of great resources discussing topics such as the potential for Services-as-a-Software, AI&#8217;s intersection with venture capital, and Vulnerability Management, including updates from FedRAMP, deep dives on reachability and more. </p><p>So, grab a coffee, here we go!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_TFS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_TFS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 424w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 848w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 1272w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_TFS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png" width="522" height="373.9326923076923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1043,&quot;width&quot;:1456,&quot;resizeWidth&quot;:522,&quot;bytes&quot;:2224795,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_TFS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 424w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 848w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 1272w, https://substackcdn.com/image/fetch/$s_!_TFS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F663f9c0c-eecc-41c6-a5cb-3dfcb3cadeae_1468x1052.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q0fM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 424w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 848w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1272w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png" width="618" height="238.11675824175825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:618,&quot;bytes&quot;:1694506,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 424w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 848w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1272w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><strong><a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">The Cost of CVEs 2025: How much are CVEs costing your business?</a></strong></h3><p>Vulnerabilities are more than just security risks&#8212;they&#8217;re an expensive, ongoing drain on resources. Chainguard just released an in-depth report, <a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">The Cost of CVEs 2025</a>, revealing how vulns are costing organizations of all sizes and industries tens of millions each year. From patch cycles and downtime to compliance overhead and incident response, the report breaks down the true, often overlooked, financial impact of vulnerability management.</p><p>Based on data from industry leading security and engineering teams, <a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">this report quantifies the organizational toll of chasing CVEs in today's threat landscape</a>. Spoiler: patching everything is neither scalable nor sustainable. It&#8217;s time to rethink traditional approaches and consider upstream strategies that eliminate vulnerabilities before they ever make it to production.</p><p>This is an excellent report for security leaders to benchmark their current vuln management strategy&#8212;and explore how leading teams are shifting left to reduce risk and cut costs.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025&quot;,&quot;text&quot;:&quot;Get the Report&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025"><span>Get the Report</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-ed-sim-the-intersection">Resilient Cyber w/ Ed Sim - The Intersection of Venture, AI, and Cyber</a></strong></h3><p>In this episode, I sat down with <strong><a href="https://boldstart.vc/">Boldstart Ventures</a></strong> Founder and GP <a href="https://open.substack.com/users/3093019-ed-sim?utm_source=mentions">Ed Sim</a>. Ed is also the author of "<strong><a href="https://www.whatshotit.vc/p/whats-in-enterprise-itvc-454">What&#8217;s Hot in Enterprise IT/VC</a></strong>,&#8221; which I&#8217;ve been reading for some time and strongly recommend checking out. We dove into the intersection of Venture Capital, AI, and Cybersecurity.</p><div id="youtube2-DqKzTX66Hi4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;DqKzTX66Hi4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/DqKzTX66Hi4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>Ed and I started the conversation discussing boldstart ventures, their role as an inception fund and their recent announcement of a $250M fund for those building the &#8220;autonomous enterprise&#8221;</p></li><li><p>Ed and I explored how AI is having an outsized impact on the investment and venture landscape and why that is, with it poised to be the largest platform shift of our lifetimes.</p></li><li><p>Ed laid out his 5 P framework, for evaluating what teams/founders to bet on and back and what he&#8217;s learned through decades of investment experience and expertise.</p></li><li><p>One of his recent success stories was investing in Protect AI, which recently was acquired by Palo Alto for roughly $700M, with the <strong><a href="https://www.paloaltonetworks.com/company/press/2025/palo-alto-networks-announces-intent-to-acquire-protect-ai--a-game-changing-security-for-ai-company">news breaking around RSA</a></strong>. Ed discussed the origin story of Protect AI and what the acquisition signals for the cybersecurity and AI security market.</p></li><li><p>One paradigm unfolding right now is that between AI Native firms and Incumbents, and it is a race between speed of innovation and speed of distribution. We discussed how this race is and can play out and what will help determines who wins or loses.</p></li><li><p>We wrapped up the conversation discussing the rise of AI driven development with coding agents, copilots, and LLMs and the implications for the AppSec space.</p></li></ul><h3><a href="https://ventureinsecurity.net/p/you-dont-start-a-platform-you-earn">You Don&#8217;t Start a Platform, You Earn the Right to Become One</a></h3><p>We&#8217;ve heard a ton in recent years about the age-old debate in cyber of Platform vs. Point Products, or, framed another way, Best of Breed vs. Consolidation. However, no company starts as a platform and instead is formed around a core competency and capability, and then expands from there. </p><p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;dcade5f6-0622-44e8-906b-a9d9a0bd02c7&quot;}" data-component-name="MentionToDOM"></span> and Shashwat Sehgal make this point exceptionally well in their recent piece on Venture In Security. They discuss the &#8220;<strong>Four Stages of Building a Platform</strong>&#8221;, which they define as:</p><ul><li><p><strong>Stage 1: The one-trick pony that opens doors (Seed to Series A)</strong></p></li><li><p><strong>Stage 2: Expanding to adjacent use cases (Series B to Series E/Growth Stage)</strong></p></li><li><p><strong>Stage 3: Becoming a platform by IPO (late stage/pre-IPO)</strong></p></li><li><p><strong>Stage 4: The $100B+ mega platform (post-IPO/public scale)</strong></p></li></ul><p>However, few make it fully down this path, falling victim to various risks and challenges or not aspiring to make a platform play. Some of the challenges cited in the article include trying to expand too quickly without establishing a core capability and customer base, and never earning the right to do so due to not differentiating themselves in their initially targeted use case.</p><p>The image below shows that companies start with a core focus and expand into new feature sets and adjacencies. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F87c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F87c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 424w, https://substackcdn.com/image/fetch/$s_!F87c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 848w, https://substackcdn.com/image/fetch/$s_!F87c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 1272w, https://substackcdn.com/image/fetch/$s_!F87c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F87c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png" width="1456" height="1067" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1067,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:959377,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F87c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 424w, https://substackcdn.com/image/fetch/$s_!F87c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 848w, https://substackcdn.com/image/fetch/$s_!F87c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 1272w, https://substackcdn.com/image/fetch/$s_!F87c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52ce1a67-f8d0-4266-b1c8-273392346de8_2180x1598.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://foundationcapital.com/the-4-6t-service-as-software-opportunity-lessons-from-year-one/">The $4.6T Services-as-Software opportunity: Lessons from year one</a></h3><p>I wrote a deep dive piece late in 2024 titled &#8220;<strong><a href="https://foundationcapital.com/the-4-6t-service-as-software-opportunity-lessons-from-year-one/">Agentic AI&#8217;s Intersection with Cybersecurity: Looking at one of the hottest trends in 2024-2025 and its potential implications for cybersecurity</a></strong>&#8221;. </p><p>In that piece, I discussed the concept of &#8220;Services-as-a-Software&#8221;, a phrase that was getting a lot of excitement from venture capital firms such as Sequoia and others, and it was because the Services market has a much larger Total Addressable Market (TAM) than software, as seen in the image below: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!snb6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!snb6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 424w, https://substackcdn.com/image/fetch/$s_!snb6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 848w, https://substackcdn.com/image/fetch/$s_!snb6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 1272w, https://substackcdn.com/image/fetch/$s_!snb6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!snb6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png" width="1456" height="769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:769,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:227919,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!snb6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 424w, https://substackcdn.com/image/fetch/$s_!snb6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 848w, https://substackcdn.com/image/fetch/$s_!snb6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 1272w, https://substackcdn.com/image/fetch/$s_!snb6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F60e7260d-19a0-4768-9995-84173f8a67c2_1458x770.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While the software market is measured in <em><strong>Billions</strong></em>, the services market is estimated to be in t<em><strong>rillions</strong></em>, making it a massive target and compelling space for venture capital and other investors, startups, founders, and more. </p><p>This piece from Ashu Garg and Jaya Gupta of Foundation Capital caught my attention this week. They reflected on the Services-as-a-Software opportunity one year into focusing on the space. As they discuss, thousands of AI-native startup companies have set out to use agents to replace human workers, whether SREs, SDRs, Accountants, etc. </p><p>While they don&#8217;t cite Cyber workers, the issue is real here, too, with startups aiming at roles from SecOps, GRC, AppSec, and more. Usually, it is phrased as &#8220;augment&#8221; rather than &#8220;replace,&#8221; partially because the technology simply isn&#8217;t mature and proven, but additionally to quell (valid) concerns from the workforce that AI is coming for their jobs. </p><p>As they discuss, the rise of AI-driven development and LLMs is impacting SaaS companies' ability to differentiate themselves based on features alone. As they say, what you build is no longer your moat; it is how you integrate, embed, and operate that is the differentiation (I would argue that to some extent, it always has been, but nonetheless). </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wzlu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wzlu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 424w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 848w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 1272w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wzlu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png" width="1456" height="771" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d4266657-1743-4bec-8b02-0827caa737b2_1846x978.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:771,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:346454,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wzlu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 424w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 848w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 1272w, https://substackcdn.com/image/fetch/$s_!wzlu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd4266657-1743-4bec-8b02-0827caa737b2_1846x978.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The authors argue that three consistent patterns separate Services-as-a-Software companies with real traction from those just riding the hype. </p><ul><li><p><strong>Product differentiation comes from implementation</strong></p></li><li><p><strong>The line between pre-sales and post-sales no longer exists</strong></p></li><li><p><strong>Companies are aligning their pricing with customer outcomes</strong></p></li></ul><p>These patterns include the commoditization of development through AI-driven copilots and LLMs, which forces companies to compete on business outcomes rather than features alone. They cite the rise of forward-deployed engineers (a trend many are copying from Palantir) to help navigate customer environments, manage edge cases, improve feedback loops, and bring insights back to the core product roadmap.</p><p>Another major change includes companies revising pricing models to focus on customer outcomes, which reflects AI doing work, not just a tool to facilitate workflows and business processes. The authors discuss a spectrum moving from Seat/Access-based pricing, Usage-based pricing, Workflow-based pricing, and Outcome-based pricing. Each model has unique considerations, such as tokens and queries used, documents processed, or reports written, and at the highest end, business outcomes delivered.</p><p>While not cited in the Foundation article, a good talk on this topic came from a Sequoia event a couple of months ago, featuring Paid CEO Manny Medina</p><div id="youtube2-ESa1TdS3dI4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ESa1TdS3dI4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ESa1TdS3dI4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>As the article discusses, outcome-based pricing is a high bar though, due to unique organizational processes, requirements and more, leaving more vendors orienting around usage and workflow-based pricing for the time being. </p><p>They close the article discussing how there needs to be a shift to focus on speed-to-value over &#8220;vibe revenue&#8221;, with companies needing to focus on the iteration of getting feedback and insights from on the ground engagement with customers and bringing it back to the product and offering to further optimize it, with an eye on the price, as described below:</p><blockquote><p><strong>Why fight so hard to perfect that loop? Because the prize isn&#8217;t the familiar $200B SaaS pool; it&#8217;s the $4.6T enterprises pour each year into salaries and outsourced services &#8211; the very labor-intelligent agents are now poised to absorb.</strong></p></blockquote><h3>AI Agent Security &lt;&gt; Investments</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jqtp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jqtp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 424w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 848w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 1272w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jqtp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png" width="1354" height="978" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:978,&quot;width&quot;:1354,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:262611,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jqtp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 424w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 848w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 1272w, https://substackcdn.com/image/fetch/$s_!Jqtp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2be84f87-6081-486b-8c85-efc9a5cc9fe9_1354x978.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I stumbled across this LinkedIn post from Brian Sack and it caught my attention. No doubt AI and Agentic AI are dominating the landscape when it comes to venture, investments and startups, as discussed by others such as Mike Privette over at Return on Security. </p><p>However, this post from Brian highlights some key points that startups pitching investors need to keep in mind. The paradigm and operating model for agentic workflows and innovations is and will be fundamentally different than traditional IT and security workflows. </p><h3><a href="https://www.meritalk.com/articles/dhs-national-guard-confirm-salt-typhoon-attacks-on-guard-networks/">DHS, National Guard Confirm Salt Typhoon Attacks on Guard Networks </a></h3><p>Officials with the National Guard Bureau and DHS both confirmed that the China-based Salt Typhoon hacking group targeted national guard networks between March and December of 2024. This includes potentially impacting National Guard unit networks and other critical infrastructure they protect. </p><p>This continues a trend of Salt Typhoon impacting U.S. critical infrastructure and China more broadly likely lying in wait to potentially invoke exploitation in the future potential conflicts between U.S. and China, which are heavily discussed in excellent books such as Dmitri Alperovitch&#8217;s &#8220;<strong><a href="https://www.amazon.com/World-Brink-America-Twenty-First-Century/dp/1541704096">World on the Brink: How America Can Beat China in the Race for the Twenty-First Century</a></strong>&#8221;. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ekPW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ekPW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 424w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 848w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ekPW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png" width="274" height="418.5202863961814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1280,&quot;width&quot;:838,&quot;resizeWidth&quot;:274,&quot;bytes&quot;:813390,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ekPW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 424w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 848w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!ekPW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82ed74d1-aef8-4e7d-adeb-91e6bba7facc_838x1280.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://arxiv.org/abs/2507.09089">Measuring the Impact of Early-2025 AI on Experienced Open-Source Developer Productivity</a></h3><p>We know the industry has seen rampant adoption of AI coding tools, for LLMs, copilots and coding assistants, with companies seeing rapid revenue growth and an expanding developer base as customers and users. Much of this is all underpinned by claims or productivity gains. However, most of these claims are anecdotal and not formally measured or researched quite yet, which is why this new research paper made headlines this week. </p><p>The study involved 16 experiences open-source developers (albeit a small sample size, no doubt) looking to navigate 246 tasks. Each developer has 5~ years of experience and has moderate experience with AI tooling. </p><p>The findings are what caught folks attention, where the Developers used Cursor Pro and Claude 3.5/3.7 Sonnet. The developers estimated the use of AI would reduce completion time by 24%, but the findings however showed that the use of AI <em><strong>increased completion time by 19%</strong></em>, slowing developers down. The researchers point out these findings not only contradict assumptions by the Developers by also contradict predictions from experts in economics and ML who projected AI will speed development by 38%-39%. </p><p>Much of the overhead in the study occurred not due to the code being unusable but the developers dealing with overhead of prompting, waiting, reviewing and fixing the code that was provided before it could be used in production. This includes Developers spending 9% of their time cleaning up the code AI produced. It also found only 44% of the code produced from the AI tooling was usable.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PhNp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PhNp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 424w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 848w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 1272w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PhNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:404301,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PhNp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 424w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 848w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 1272w, https://substackcdn.com/image/fetch/$s_!PhNp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624cecc1-bdf6-4e45-b606-8a5c46e9dbfc_1808x904.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://arxiv.org/abs/2507.05538">Red Teaming AI Red Teaming</a></h3><p>We've heard a lot about "AI Red Teaming" in the last 18-24 months. However, it has overwhelmingly focused on model-centric vulnerabilities. This is problematic, especially with the rise of Agents, enabling protocols (e.g., A2A, MCP, et), underlying Cloud infrastructure, organizational context, users, and more. <br><br>In short, it's a myopic way to red team AI, as laid out by Brian Pendleton, <strong><a href="http://d.sc/">D.Sc</a></strong>., and team in this new paper titled "Red Teaming AI Red Teaming". They recommend a much more comprehensive approach, including multifunctional teams, a study of systemic vulnerabilities, and the interdependencies of technical and social factors. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yRv2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yRv2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 424w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 848w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 1272w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yRv2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png" width="498" height="397.36787564766837" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:924,&quot;width&quot;:1158,&quot;resizeWidth&quot;:498,&quot;bytes&quot;:333231,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yRv2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 424w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 848w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 1272w, https://substackcdn.com/image/fetch/$s_!yRv2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3d43c64-b0d2-42d6-9421-b15218651295_1158x924.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Defense in depth is alive and well, or should be! </p><h3><a href="https://research.empiricalsecurity.com/research/benchmarking-llms">Benchmarking LLMs on the Vulnerability Prioritization Task</a></h3><p>We seem to be living in an era where AI and LLMs are the answer to everything&#8230;and shouldn&#8217;t be. This recent research from the Empirical Security team is a good reminder of that, as they compared the performance of LLMs to the Exploit Prediction Scoring System (EPSS) and found that LLM&#8217;s underperform compared to LLMs. </p><p>Not only were they not as effective at prediction but there are also substantial inference costs involved, where EPSS is a free community resource. The LLMs generated probabilities that skew upwards, over actual exploitation, meaning they not only would be more costly due to inference, but also would likely lead to increased false positives (FP) and wasted time on remediation and toil for developers, the exact thing we need to be moving away from as a community in AppSec too.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tQeC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tQeC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 424w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 848w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 1272w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tQeC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png" width="1456" height="839" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:839,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:199837,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tQeC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 424w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 848w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 1272w, https://substackcdn.com/image/fetch/$s_!tQeC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F321ea8ea-cc44-41cf-be76-c26a26239a55_2152x1240.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lehi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lehi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 424w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 848w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lehi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png" width="1456" height="798" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:798,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:316655,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lehi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 424w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 848w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!Lehi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee98236d-ca38-4c1b-9a9f-6551c2523c89_2074x1136.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://thehill.com/policy/technology/5388471-anthropic-transparency-framework-ai-models">Anthropic Proposes Transparency Framework for Frontier AI Models</a></h3><p>Anthropic&#8217;s CEO recently announced that the Anthropic team is proposing a targeted framework that involves a series of transparency rules around safety and secure development of frontier AI models. They&#8217;re aiming for it to also be lightweight and flexible and not impact innovation either. </p><p>It is proposed due to the reality that industry, governments, and academia may be working on safety standards and evaluation methods, these likely will take several years to be fully matured, implemented and adopted or required. </p><p>Their proposal would require developers to publicly release a secure development framework which details how they assess and mitigate unreasonable risks, and also publish a system card which summarizes their testing and evaluation procedures. </p><h1>AppSec, Vulnerability Management and Supply Chain</h1><h3><a href="https://www.endorlabs.com/learn/endor-labs-oligo-closing-the-loop-between-secure-code-and-secure-runtime">Endor Labs &amp; Oligo: Closing the Loop Between Secure Code and Secure Runtime</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fO1J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fO1J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 424w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 848w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 1272w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fO1J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png" width="490" height="220.22471910112358" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:560,&quot;width&quot;:1246,&quot;resizeWidth&quot;:490,&quot;bytes&quot;:508051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fO1J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 424w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 848w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 1272w, https://substackcdn.com/image/fetch/$s_!fO1J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F806c2aec-5bc8-4955-9807-db9793c1a2c1_1246x560.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>If you&#8217;ve been following me for a while, you&#8217;ve likely heard me mention both teams, Endor Labs and Oligo. I currently serve as the Chief Security Advisor at Endor Labs, and they&#8217;re a leader in the Software Composition Analysis (SCA) and AppSec space. In recent years, runtime security has also gotten more attention, as organizations look to not just &#8220;shift left&#8221; but also remain aware of runtime risks and vulnerabilities as well.</p><p>In this joint blog between the teams, they discuss how Endor Labs uses their MCP server to enable AI-assistant context rich data including call graphs, function-level reachability and signed container images in leading IDE&#8217;s such as Cursor. Moving further in the SDLC, Oligo comes into play via the CI to provide an SBOM of what&#8217;s actually running, and provides that SBOM to Endor, include package ID&#8217;s, licensing and known CVE&#8217;s, coupled with Endor&#8217;s static reachability graph. </p><p>This duo of Endor and Oligo provides runtime prevention coupled with context-rich remediation opportunities, providing end-to-end coverage for AppSec teams.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cMFn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cMFn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 424w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 848w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cMFn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png" width="584" height="346.14835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:863,&quot;width&quot;:1456,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:244639,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cMFn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 424w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 848w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!cMFn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04ad3a3e-429b-4d24-9dd6-8a0a245ac411_2028x1202.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I love to see this partnership between two industry leaders each bringing their unique capabilities and differentiation to bear for AppSec teams to reduce organizational risks.</p><h3><a href="https://www.fedramp.gov/rfcs/0012/">Continuous Vulnerability Management Standard</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gYAW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gYAW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 424w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 848w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 1272w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gYAW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png" width="582" height="178.6771978021978" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:447,&quot;width&quot;:1456,&quot;resizeWidth&quot;:582,&quot;bytes&quot;:175199,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gYAW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 424w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 848w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 1272w, https://substackcdn.com/image/fetch/$s_!gYAW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0f0ecf-13f3-4d7c-9a11-e8447a033de7_2722x836.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Everyone is talking about the latest <strong><a href="https://www.linkedin.com/company/gsa-fedramp/">FedRAMP&#174;</a></strong> Continuous Vulnerability Management Standard and how FedRAMP is modernizing its approach to vulnerability management.<br><br>I'm a huge advocate of this, of course, having written a book titled "<strong><a href="https://a.co/d/9D6n0vZ">Effective Vulnerability Management</a></strong>" from <strong><a href="https://www.linkedin.com/company/john-wiley-and-sons/">Wiley</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MNO1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MNO1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 424w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 848w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 1272w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MNO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png" width="206" height="296.62131519274374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1270,&quot;width&quot;:882,&quot;resizeWidth&quot;:206,&quot;bytes&quot;:918585,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MNO1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 424w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 848w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 1272w, https://substackcdn.com/image/fetch/$s_!MNO1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39512aa9-00bc-46e2-93b1-79743fd93285_882x1270.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That said, before discussing the fundamental changes they're making, I wanted to give a shout-out to <strong><a href="https://www.linkedin.com/in/ACoAAABin2IBAe4X1OdNZa6a-AK5Hbhw5Yd0TgE">Pete Waterman</a></strong> and the FedRAMP team for this line in particular:</p><blockquote><p><strong>"FedRAMP now works with the community to understand the impact of its policies and adjust them based on real-world experiences"</strong></p></blockquote><p>This seems trivial and a given, but the truth is many compliance frameworks and policy makers rarely take the time to truly listen to practitioners in the trenches doing the work, and revise and iterate compliance policies accordingly. <br><br>This is often why you have compliance requirements that are out of touch with reality and usually don't make sense, or worse, create more risks than they mitigate. You should read this if you're a Cloud Service Provider (CSP) working with the U.S. Government or DoD.<br><br>It demonstrates that FedRAMP is listening to the industry and moving towards factors such as known exploitation, exploitability, reachability, mitigating controls, and organizational context over legacy approaches such as CVSS base scores.</p><p>I&#8217;ll likely be doing a standalone deep dive piece on this updated FedRAMP Vulnerability Management guidance soon and why it is long overdue, and also helpful, so stay tuned for that.</p><h3><a href="https://www.miggo.io/vulnerability-database">Miggo Predictive Vulnerability Database</a></h3><p>We all know when it comes to vulnerability management, focusing on context such as known exploitability, exploitability, reachability, business context and more is key. That is why it is cool to see runtime and Application Detection &amp; Response (ADR) vendor Miggo share their predictive vulnerability database. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hfOP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hfOP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 424w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 848w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 1272w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hfOP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png" width="1456" height="384" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:384,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:276360,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hfOP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 424w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 848w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 1272w, https://substackcdn.com/image/fetch/$s_!hfOP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f74af48-3951-40b2-95f7-973f3116c6b2_2982x786.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The database aims to not just document CVE&#8217;s but also provide insights such as how a vulnerability works, how it can be exploited and what defenders can do about it. This includes providing data such as function-level evidence, root cause analysis, exploit condition simulations and even tailored WAF rules for mitigation. </p><p>Much of the data seems to be free, but also there seems to be an aspect of it that allows teams to pay for additional resources (e.g. WAF rules for example). Even that aside, the free insights are key to helping AppSec teams dig deeper and better understand vulnerabilities and what they can do about them. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k5oG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k5oG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 424w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 848w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 1272w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k5oG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png" width="1456" height="524" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:524,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:248315,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k5oG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 424w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 848w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 1272w, https://substackcdn.com/image/fetch/$s_!k5oG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff25059de-d985-4ba9-836c-cecf99a53113_2972x1070.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html">Everything to Know about Runtime Reachability</a></h3><p>We&#8217;ve seen an industry shift (pun intended) from the hyper-focus on &#8220;shift left&#8221; to now accepting that runtime visibility, reachability and security is key as well, especially knowing production runtime workloads and environments are a core target for attackers, coupled with many getting fatigue from how poorly shift left has been implemented with noisy tools and a lack of context.</p><p>In this piece on Hacker News, my friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;James Berthoty&quot;,&quot;id&quot;:215222117,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029c069a-0ea1-4c28-bedb-742a03fa770a_800x800.jpeg&quot;,&quot;uuid&quot;:&quot;750499d3-dd94-4863-a213-1177f0bb1d0b&quot;}" data-component-name="MentionToDOM"></span> provides a masterclass on &#8220;everything you need to know about runtime reachability&#8221;. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wSJL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wSJL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 424w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 848w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 1272w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wSJL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png" width="1456" height="924" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:924,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1308572,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wSJL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 424w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 848w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 1272w, https://substackcdn.com/image/fetch/$s_!wSJL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F759437c7-8177-40c7-8269-0bc3f39be821_1998x1268.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As James describes it, reachability is essentially showing exploitable vulnerabilities (e.g. they can be reached/exploited) and he compares static and runtime reachability and he even argues that if the goal is to fix exploitable vulnerabilities, then runtime is the way to do so. I won&#8217;t go as far as James, because I think there is value in fixing things before they make it to production (and potentially get exploited), as well as earlier in the SDLC, but I understand the sentiment of what James means here. </p><p>He lays out flavors of runtime reachability, as seen below: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Fxw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Fxw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 424w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 848w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 1272w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Fxw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png" width="1456" height="806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:733653,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Fxw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 424w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 848w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 1272w, https://substackcdn.com/image/fetch/$s_!9Fxw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dbd0cbd-34c0-4e89-9103-1a92b86b9eae_1872x1036.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They include a spectrum of trustworthiness of de-prioritization as well as a trustworthiness of prioritization, which is key as organizations want to make sure they focus on the right things and reduce risks to organizations while also not ignoring things which can have an impact. </p><p>James provides the below diagram to depict the key differences between Static and Runtime Reachability:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FBII!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FBII!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 424w, https://substackcdn.com/image/fetch/$s_!FBII!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 848w, https://substackcdn.com/image/fetch/$s_!FBII!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 1272w, https://substackcdn.com/image/fetch/$s_!FBII!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FBII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png" width="1456" height="1070" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1070,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1763359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FBII!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 424w, https://substackcdn.com/image/fetch/$s_!FBII!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 848w, https://substackcdn.com/image/fetch/$s_!FBII!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 1272w, https://substackcdn.com/image/fetch/$s_!FBII!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c1de078-88f8-4e9f-ba61-d0b0d7458915_1994x1466.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As you can see, the core differences include both when they occur in the SDLC, as well as what they can and the type of insights they can provide (or not). As James discusses, the context of exploitability can be complex, involving factors such as where the vulnerability exists in the workload, cloud or application environments. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j2AF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j2AF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 424w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 848w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 1272w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j2AF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png" width="657" height="382.64835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1456,&quot;resizeWidth&quot;:657,&quot;bytes&quot;:811643,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j2AF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 424w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 848w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 1272w, https://substackcdn.com/image/fetch/$s_!j2AF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a3c391d-02f5-45e4-8391-23b8fc855f92_1878x1094.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BfSa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BfSa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 424w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 848w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 1272w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BfSa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png" width="1456" height="795" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:795,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1010956,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168378103?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BfSa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 424w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 848w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 1272w, https://substackcdn.com/image/fetch/$s_!BfSa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa520503-2ab6-4ce1-bd28-3ec4066e324e_1890x1032.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To put it shortly, reachability is complex and there is no silver bullet, and James concludes emphasizing that you need all of them depending on the vulnerability. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Entering the AI Controls Matrix]]></title><description><![CDATA[A look at Cloud Security Alliance's AI Controls Matrix]]></description><link>https://www.resilientcyber.io/p/entering-the-ai-controls-matrix</link><guid isPermaLink="false">https://www.resilientcyber.io/p/entering-the-ai-controls-matrix</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Mon, 14 Jul 2025 12:45:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0VYT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re following the cybersecurity space, you inevitably have noticed that topics such as AI governance and secure adoption are a core part of the AI conversation. We see different approaches to AI regulation, such as in the U.S. or the EU, and frameworks from ISO and NIST to help organizations securely govern and implement AI.</p><p>Not to be left behind, the Cloud Security Alliance recently launched its &#8220;<strong><a href="https://cloudsecurityalliance.org/artifacts/ai-controls-matrix">AI Controls Matrix: A Comprehensive Framework for Trustworthy AI</a></strong>,&#8221; and I wanted to check it out and share my findings with you all. </p><p>So, let&#8217;s take a look.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0VYT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0VYT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 424w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 848w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 1272w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0VYT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png" width="300" height="393.4065934065934" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:546,&quot;resizeWidth&quot;:300,&quot;bytes&quot;:465582,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0VYT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 424w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 848w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 1272w, https://substackcdn.com/image/fetch/$s_!0VYT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54c9e2b7-faae-4a2f-8326-c461bdcec167_546x716.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><h1>High-Level</h1><p>At a high level, CSA:</p><blockquote><p><strong>&#8220;Envisions organizations using the AI Controls Matrix (AICM) to develop, implement, and operate AI technologies in a secure and responsible manner.&#8221;</strong></p></blockquote><p>Thankfully, CSA didn&#8217;t set out to reinvent the wheel and instead leaned into some of the resources I mentioned above, such as ISO 42001, ISO 27001, NIST&#8217;s AI Risk Management Framework (AI RMF), and BSI. </p><p>It is also a freely available resource to the community, developed by leading AI and security professionals through collaborative input. It is vendor-agnostic and not tied to any specific AI product, platform, or provider. </p><p>The AICM has five pillars, which are seen below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5qql!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5qql!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 424w, https://substackcdn.com/image/fetch/$s_!5qql!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 848w, https://substackcdn.com/image/fetch/$s_!5qql!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 1272w, https://substackcdn.com/image/fetch/$s_!5qql!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5qql!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png" width="1456" height="599" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:599,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:156303,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5qql!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 424w, https://substackcdn.com/image/fetch/$s_!5qql!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 848w, https://substackcdn.com/image/fetch/$s_!5qql!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 1272w, https://substackcdn.com/image/fetch/$s_!5qql!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6142d6b8-4990-42aa-bbcd-d470f2a0a31b_1808x744.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Each control covers factors such as:</p><ul><li><p><strong>Control Type</strong></p></li><li><p><strong>Control Applicability and Ownership</strong></p></li><li><p><strong>Architectural Relevance</strong></p></li><li><p><strong>Lifecycle Relevance</strong></p></li><li><p><strong>Threat Category</strong></p></li></ul><p>The CSA also released a presentation introducing AICM:</p><div id="youtube2-NYgd4ajhKac" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;NYgd4ajhKac&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/NYgd4ajhKac?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>At the AICM landing page you can download an &#8220;AICM Bundle&#8221;, which I did, and it includes an AI-CAIQ of AICM (Questionnaire), mappings of AICM to BSI AI C4 and AICM to NIST 600-1, as well as AICSM v 1.0 itself.</p><p>AICM includes <strong>243</strong> controls structured across <strong>18</strong> domains. </p><p>When you open AICM you can see the various taps, such as Introduction, AICM v1, Scope Applicability, AICM Self-Assessment Questions, and more. </p><p>Below is a snapshot, where you can see Control Domains, Titles, ID&#8217;s, Specifications, Type and more. You can see how some controls are Cloud &amp; AI Related, while others are strictly AI Related. </p><p>Additionally, they help break down the typical control applicability and ownership, with some being owned by the model provider whereas others for example may be shared by the owned by the AI customer and some are shared, much like the Cloud Shared Responsibility Model prior to AI&#8217;s widespread adoption.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GnGm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GnGm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 424w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 848w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 1272w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GnGm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png" width="1456" height="796" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:796,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2368636,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GnGm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 424w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 848w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 1272w, https://substackcdn.com/image/fetch/$s_!GnGm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45079f76-4f68-4a06-8623-415ab5e2d1ad_3250x1776.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>AICM Scope/Mapping</h3><p>Another tab in the AICM sheet is the AICM Scope Applicability (Mapping) tab, which is helpful if you&#8217;re organization has or will need to align with and implement other frameworks such as BSI AI C4, NIST AI RMF etc. </p><p>It lays out what AICM controls have no gaps with mapping to other frameworks, and which ones either are a full or partial gap, as you crosswalk your compliance and alignment across the various frameworks. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iV8R!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iV8R!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 424w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 848w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 1272w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iV8R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png" width="1456" height="789" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:789,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1438153,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iV8R!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 424w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 848w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 1272w, https://substackcdn.com/image/fetch/$s_!iV8R!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec42709-0e1e-43e7-8c77-cc1186449e93_3226x1748.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>AICM Control Domains</h3><p>Personally whenever I see a new control framework, I like to get a look at the control domains that it involves, to understand how it groups controls as well as what the scope of the overall framework is. Let&#8217;s take a look at the Control Domains from AICM</p><ul><li><p>Audit And Assurance</p></li><li><p>Application and Interface Security</p></li><li><p>Business Continuity Management and Operational Resilience</p></li><li><p>Change Control and Configuration Management</p></li><li><p>Cryptography, Encryption and Key Management</p></li><li><p>Datacenter Security</p></li><li><p>Data Security and Privacy Lifecycle Management</p></li><li><p>Governance, Risk and Compliance</p></li><li><p>Human Resources</p></li><li><p>IAM</p></li><li><p>Interoperability and Portability</p></li><li><p>Infrastructure Security</p></li><li><p>Logging and Monitoring</p></li><li><p>Model Security</p></li><li><p>Security Incident Management, E-Discovery &amp; Cloud Forensics</p></li><li><p>Supply Chain Management, Transparency and Accountability</p></li><li><p>Threat &amp; Vulnerability Management</p></li><li><p>Universal Endpoint Management</p></li></ul><p>As you can see, the AICM Control Domains are both robust and diverse, covering a combination of people, process and technology, as well as both underlying infrastructure and core application security concepts while also accounting for novel aspects of AI, such as Model Security.</p><h3>AICM Self-Assessment Questions</h3><p>The AICM Self-Assessment Question tab is helpful as it lays out the controls discussed above and provides a library of self-assessment questions so organizations can conduct self-assessments to identify where they are meeting AICM controls (and controls in the other frameworks it maps to) and where they gave gaps they need to document and remediate at a future date. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DTM3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DTM3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 424w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 848w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 1272w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DTM3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png" width="1456" height="776" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:776,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2651617,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DTM3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 424w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 848w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 1272w, https://substackcdn.com/image/fetch/$s_!DTM3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd8d6524-e8f6-4b9d-897c-f443ab16d37d_3304x1760.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>LLM Taxonomy</h3><p>The LLM Taxonomy is also helpful as much of the lexicon around LLMs and AI may be new to organizations, security practitioners and the assessment and audit community. Phrases such as Retreival-Augmented Generation (RAG), Fine-Tuning, Data Poisoning, Model Manipulation and more.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cFia!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cFia!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 424w, https://substackcdn.com/image/fetch/$s_!cFia!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 848w, https://substackcdn.com/image/fetch/$s_!cFia!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 1272w, https://substackcdn.com/image/fetch/$s_!cFia!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cFia!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png" width="1456" height="765" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:765,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2008784,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/168077469?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cFia!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 424w, https://substackcdn.com/image/fetch/$s_!cFia!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 848w, https://substackcdn.com/image/fetch/$s_!cFia!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 1272w, https://substackcdn.com/image/fetch/$s_!cFia!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12ace6ac-122c-4312-bd28-a06c82c3136d_3272x1720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Tying It All Together</h1><p>AICM represents another great contribution to the Cyber community from CSA and ties into the CSA ecosystem of other resources as well. For example, they shared they launched their &#8220;STAR for AI Program&#8221; where organizations can demonstrate a commitment to trustworthy AI and even achieve a third-party validation of organizational alignment with AICM. They also offer an AI Trustworthy Pledge organizations can make.</p><p>While not currently required by regulatory frameworks and regimes, AICM represents a robust and coherent approach to helping organizations implement AI securely and a repeatable and scalable way for assessors to measure that. It&#8217;s ability to tie together the various leading frameworks from a mapping perspective also makes it a great resource for organizations to measure their maturity across leading AI frameworks in an effective manner.</p><p>Great work by the entire AICM and CSA teams who contributed to this resource for the community!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #55]]></title><description><![CDATA[10 Immutable Laws of Cyber, NATSEC 100, AI Regulation Contrasts, LLMs and Secure Coding, Application Attack Matrix & fwd:cloudsec Summaries]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-55</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-55</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 10 Jul 2025 14:24:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GHAN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome</h1><p>Welcome to issue #55 of the Resilient Cyber Newsletter. </p><p>I hope everyone is enjoying summer, as I know it is going well on my end. As I mentioned, I recently visited Northern Virginia to watch my son compete in the Virginia Little League State Championship this past weekend.</p><p>We made it to the quarter finals but lost to a Northern Virginia team. Apparently, my NOVA friends are a little league powerhouse, boasting several teams making it to the finals!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9-EP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9-EP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 424w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 848w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 1272w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9-EP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png" width="374" height="453.60135135135135" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1436,&quot;width&quot;:1184,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:3899081,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9-EP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 424w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 848w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 1272w, https://substackcdn.com/image/fetch/$s_!9-EP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8edb2f75-b8eb-43a2-b9d7-d035dcd610fc_1184x1436.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But, enough about me, this week we have a <em><strong>lot</strong></em> of awesome cyber resources to dive into, including a look at how immutable laws of cyber <em>still</em> stand strong 25 years later, AI regulatory contrasts between the U.S. and EU, using LLMs to produce secure code (or not) and the introduction of an Application Attack Matrix among much more. </p><p>So, here we go!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GHAN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GHAN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 424w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 848w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GHAN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png" width="596" height="409.34065934065933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1456,&quot;resizeWidth&quot;:596,&quot;bytes&quot;:2574407,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GHAN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 424w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 848w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!GHAN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0638249-03fb-4e85-bb4d-de24296bcf93_1636x1124.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q0fM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 424w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 848w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1272w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png" width="618" height="238.11675824175825" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:561,&quot;width&quot;:1456,&quot;resizeWidth&quot;:618,&quot;bytes&quot;:1694506,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q0fM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 424w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 848w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1272w, https://substackcdn.com/image/fetch/$s_!Q0fM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ff4948d-a7b3-48eb-b955-0da305822252_1930x744.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><strong><a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">The Cost of CVEs 2025: How much are CVEs costing your business?</a></strong></h3><p>Vulnerabilities are more than just security risks&#8212;they&#8217;re an expensive, ongoing drain on resources. Chainguard just released an in-depth report, <a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">The Cost of CVEs 2025</a>, revealing how vulns are costing organizations of all sizes and industries tens of millions each year. From patch cycles and downtime to compliance overhead and incident response, the report breaks down the true, often overlooked, financial impact of vulnerability management.</p><p>Based on data from industry leading security and engineering teams, <a href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025">this report quantifies the organizational toll of chasing CVEs in today's threat landscape</a>. Spoiler: patching everything is neither scalable nor sustainable. It&#8217;s time to rethink traditional approaches and consider upstream strategies that eliminate vulnerabilities before they ever make it to production.</p><p>This is an excellent report for security leaders to benchmark their current vuln management strategy&#8212;and explore how leading teams are shifting left to reduce risk and cut costs.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025&quot;,&quot;text&quot;:&quot;Get the Report&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://get.chainguard.dev/cost-of-cves-2025-report?utm_source=ResilientCyber&amp;utm_medium=3p-sponsorship&amp;utm_campaign=FY26-GL-WEB-CostofCVEsWP2025"><span>Get the Report</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.linkedin.com/pulse/cybersecurity-job-market-broken-everyone-knows-tracey-webb--bs6jc/">The Cybersecurity Job Market is Broken - And Everyone Knows It</a></h3><p>In a damning piece from Tracey Webb, he calls out the cybersecurity job market, arguing that CISOs and security leaders have outsourced critical hiring functions in Cyber to HR, AI and keyword searches. </p><p>The post must have resonated, as it garnered several hundred interactions and nearly 100 shares on LinkedIn. The piece raises points that remind me of a piece I shared earlier this year from Chase Cunningham, who said rampant layoffs weren&#8217;t due to AI, but companies just looking to maximize profit and cut expenses (labor). </p><p>There&#8217;s truth to this piece, but I would also say that struggling folks often miss critical activities such as building a deep network, building a personal brand/reputation, staying relevant in the domain knowledge of emerging technologies, and more. </p><p>It&#8217;s a two-way street. While hiring is getting more difficult due to ridiculous position descriptions, requirements, automation, and outsourcing to HR, we also need to do everything we can to ensure we&#8217;re in a position to be highly in demand and marketable from a labor perspective. </p><h3><a href="https://www.linkedin.com/posts/siddhanttrivedi_conference-bhusa-cyber-activity-7348357739972071424-Iqx6?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Black Hat Startup Spotlight Competition Finalists</a></h3><p>One of the largest cybersecurity conferences is around the corner, in Black Hat. Much like RSA, this event has an angle that looks to highlight the most innovative and disruptive startups, and their recent &#8220;Startup Spotlight Competition&#8221; finalists were recently announced. </p><p>They include:</p><ul><li><p>FireTail.ai</p></li><li><p>Keep Aware</p></li><li><p>Prime Security</p></li><li><p>Twine Security</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ykE7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ykE7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 424w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 848w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 1272w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ykE7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png" width="1456" height="987" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:987,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1693361,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ykE7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 424w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 848w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 1272w, https://substackcdn.com/image/fetch/$s_!ykE7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2d2251d-4e0e-4d49-ba60-b6ec9372bf76_1814x1230.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As seen above, the judging panel also made honorable mention of 5 other firms. Watching the finalists' presentations and seeing who walks away from the event at the top will be exciting!</p><h3><a href="https://ventureinsecurity.net/p/10-immutable-laws-of-security-25">Reflecting on &#8220;10 Immutable Laws of Security&#8221; 25 Years Later</a></h3><p>My friend <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;8c94d0c9-ca31-4b9b-9bf3-7d8c3dfed7a8&quot;}" data-component-name="MentionToDOM"></span> recently wrote a piece on Microsoft&#8217;s Security Response Center&#8217;s 10 Immutable Laws of Security, which are now more than two decades old and are framed as fundamental truths related to cybersecurity.</p><p>As MSFT pointed out way back, the origin of security issues is much more closely related to the nature of systems, people, and trust than to any specific code or bugs, almost like universal laws of nature. </p><p>The laws are inevitably spot on, and what&#8217;s ironic is how painfully true they are, but we still counterintuitively violate their principles. See below for some examples:</p><ul><li><p><strong>Law #1 - &#8220;If a bad guy can persuade you to run his program on your computer, it&#8217;s not your computer anymore&#8221;. </strong></p><ul><li><p>They explained how, if a stranger came up and handed you a sandwich, you would eat it. Of course not. Yet, ironically, when it comes to open source, we rampantly consume open source software with little insight into its true provenance and origin or its safety, at a pace that is growing more than ever, as I have discussed in various pieces. </p></li></ul></li><li><p><strong>Law #8 - &#8220;An out-of-date virus scanner is only marginally better than no virus scanner at all.&#8221;</strong></p><ul><li><p>While this one is focused on AV, which is still relevant, I couldn&#8217;t help but think of the whole shift-left mantra, and how low fidelity noisy tools we&#8217;ve dumped on developers that orient around non-exploited/non-exploitable vulnerability, base CVSS scores, and more feel right at home with this law. They&#8217;re purely noise and toil, and next to useless.</p></li></ul></li><li><p><strong>Law #10: Technology is not a panacea</strong></p><ul><li><p>This one in particular is so damn true as it was 25 years ago. I&#8217;ve written many times about People, Process, and Technology - <em><strong>in that order,</strong></em> regarding significance. Yet, the entire cybersecurity industry is oriented around tools, venture capital, and startups; all enterprises drown in tens to hundreds of security tools, most of which are never fully implemented, configured, tuned, optimized, or deliver real value in stopping organizational risks. As I have written, your security tools may be posing more risk than they are stopping!</p></li></ul></li></ul><p>Ross does a great job covering the 10 Laws and how they are as true as ever, while also weaving in relevant context about how the landscape and technology have changed in the past 2+ decades.</p><h3><a href="https://www.axios.com/newsletters/axios-future-of-cybersecurity-fab0c0d0-5760-11f0-8c09-e72f7ef7d797.html">The Cybercriminal Group Wreaking Havoc on Corporate America</a></h3><p>This piece from Axious highlighted the ongoing activity of &#8220;Scattered Spider,&#8221; a hacking group that has been targeting retailers, grocery chains, insurance providers, and airlines across the U.S. using techniques such as help desk impersonation and SIM Swapping. </p><p>One thing that makes the group unique is that it isn&#8217;t a mature, organized hacking group but a loose coalition of young men and teenagers who came out of the gaming community and are using ransomware to impact their victims. </p><p>Despite their age and loose nature, they have an internal organizational structure, tiered positions of maturity, and run like an actual business. While they have made recent headlines, they first gained fame by hacking MGM Resorts and Caesars Entertainment in 2023 and are largely using the same techniques today with much success. This highlights the bleak nature of most modern corporate cybersecurity.</p><p>Industry leader Jen Easterly <strong><a href="https://www.linkedin.com/posts/jen-easterly_axios-future-of-cybersecurity-activity-7348474477023821824-RLTN?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">took to LinkedIn</a></strong>, calling the group &#8220;Scumbag Spider&#8221; instead, and stating they aren&#8217;t ninjas and are using attack techniques that could be mitigated by a Secure-by-Design/Demand approach from industry. </p><p>She stated:</p><blockquote><p><strong>&#8220;IMHO, this isn't a story about clever hackers or even about human error. The fact that Scumbag Spider continues to succeed using largely unchanged tactics over multiple years is yet another example of systems that were never designed with security as a foundational principle.&#8221;</strong></p></blockquote><h3><a href="https://www.natsec100.org/">Silicon Valley Defense Group (SVDG) NATSEC 100 - 2025 Edition</a></h3><p>I spend a fair amount of my time focused on the public sector, including DoD, due to my role as the Co-Founder and CEO of a Public Sector-focused digital services firm, Aquia. </p><p>That&#8217;s why the SVDG NATSEC 100 caught my attention this week. Produced in partnership with JP Morgan, it provides insights into the top 100 venture-backed, dual-use, and defense technology companies focused on national security. </p><p>The report cites in 2024 they saw a ~2.3x increase in prior year spend by the DoD on NatSec 100 companies, which isn&#8217;t too surprising for those paying attention, as the current administration had a strong backing from silicon valley and venture capital as well as a mandate to try and disrupt the status quo in terms of primes and vendors. The report also points out that this still accounts for &lt;1% of the total DoD budget, emphasizing just how dominant the traditional DoD primes are. </p><p>Another interesting anecdote is that they offer their analysis and dataset with and without SpaceX, due to its outsized funding, as well as its outsized Government contracts compared to the rest of the NatSec 100, which again for those following politics, could be an interesting thing to keep an eye on given the tension between President Trump and Elon. </p><p>Below is a snapshot of some of their key stats/findings:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LpLy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LpLy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 424w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 848w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 1272w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LpLy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png" width="1456" height="923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:923,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1392482,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LpLy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 424w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 848w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 1272w, https://substackcdn.com/image/fetch/$s_!LpLy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6a29bc7-a1df-4ea1-8765-5dbac783121b_2688x1704.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Also, the top 15 companies ranked:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!elqc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!elqc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 424w, https://substackcdn.com/image/fetch/$s_!elqc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 848w, https://substackcdn.com/image/fetch/$s_!elqc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 1272w, https://substackcdn.com/image/fetch/$s_!elqc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!elqc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png" width="1456" height="875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:875,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:366484,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!elqc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 424w, https://substackcdn.com/image/fetch/$s_!elqc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 848w, https://substackcdn.com/image/fetch/$s_!elqc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 1272w, https://substackcdn.com/image/fetch/$s_!elqc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd487fd3c-168f-4891-bec9-9739f9869433_2470x1484.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report is worth reading if you&#8217;re interested in and passionate about the DoD market from a technology and capital perspective.</p><h1>AI</h1><h3><a href="https://apnews.com/article/congress-ai-provision-moratorium-states-20beeeb6967057be5fe64678f72f6ab0">AI Patchwork Quilt of Regulation Forthcoming</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T7mK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T7mK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 424w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 848w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 1272w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T7mK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png" width="1456" height="450" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:450,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:184541,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T7mK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 424w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 848w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 1272w, https://substackcdn.com/image/fetch/$s_!T7mK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac3ac00d-b004-457a-918b-cac7b6c9198b_2356x728.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As part of the recent &#8220;Big Beautiful Bill,&#8221; a 10-year moratorium (e.g., a ban) on state-level AI compliance and regulation was proposed, but it was recently struck down and removed from the bill's version that passed. </p><p>This is a dynamic topic that has valid arguments in both directions. On one hand, AI is too immature and evolving to be regulated effectively. Efforts to do so could hinder innovation and lead to economic and national security consequences for the U.S. (and others). </p><p>On the other hand, it could be argued that we need a comprehensive, cohesive compliance regime to avoid a patchwork quilt of state-level regulations that will be costly and cumbersome for businesses to navigate and impose challenges and impacts on consumers. Citizens of different states/nations could be constrained regarding what innovative AI services, products, models, etc., they can access. </p><p>We&#8217;re headed for that patchwork quilt, as the 10-year state-level ban was removed from the passed bill. Many states have already ushered in one or more AI regulatory requirements that businesses must now navigate.</p><p>This topic, as discussed in major news outlets such as AP and many others, involves many dynamics and angles, from differences between the two parties to big techs pushing for the moratorium, to states looking to assert their rights to regulate. In the absence of a coherent Federal-level AI regulatory regime, states are expected to step in, much like they&#8217;ve done with privacy here in the US.  </p><h3><a href="https://medium.com/@AdamThierer/the-ai-regulatory-moratorium-fails-what-comes-next-9bd80e14f36b">The AI Regulatory Moratorium Fails: What Comes Next?</a></h3><p>In the wake of the 10-year regulatory moratorium failing, some have penned strong opinions on what will happen next. This includes Adam Thierer, who details some of the policy and even national security and economic implications in this piece. </p><p>Adam makes three primary arguments:</p><ul><li><p><strong>California and New York will now take the lead in shaping national AI policy</strong></p></li><li><p><strong>It&#8217;s a devastating blow for &#8220;Little Tech&#8221; AI players, as large tech companies will be able to easily comply with the confusing, costly compliance burdens that will come from the patchwork reality</strong></p></li><li><p><strong>It represents a major setback for America&#8217;s efforts to have a coherent, pro-innovation, pro-investment policy approach in the battle against China for global AI leadership</strong></p></li></ul><p>While some may find Adam&#8217;s arguments flawed, he raises some good points. In security and compliance, we often use the phrase &#8220;high water mark&#8221; to meet the most rigorous compliance requirements upfront. Many tech and AI organizations will inevitably be forced to meet the most stringent U.S. (and global) AI regulatory requirements, such as those from NY and CA, regardless of what the other states say or do, due to the reality that it is too costly and impractical to have countless different products and services for each state.</p><p>Adam argued that the irony is that much of the animosity around the moratorium was directed at &#8220;Big Tech.&#8221; Still, those big firms are the ones who will be able to navigate the costly and confusing patchwork AI regulatory model where they are headed, with smaller firms struggling to manage the cost and complexity of compliance. I have seen this play out in areas such as FedRAMP and the DoD SRG related to Cloud and ATO&#8217;s in the public sector, as larger firms can afford the time and cost to meet the compliance requirements, and afford to enter these markets, essentially locking out smaller firms with less resources, even if they have innovative products and services the industry could benefit from. </p><p>To his last point about impacting a pro-innovation and pro-investment policy approach to compete with China for AI leadership, one of the best ways to mitigate what is happening would be for the Federal government to take the lead with a coherent, cohesive approach to AI regulation, mitigating the states&#8217; need to step in. That said, of course, some states, such as CA/NY, can and will impose their regulatory requirements, but this would at least provide a uniform Federal pathway for industry and also allow companies to avoid some states if needed while still driving the nation forward from a competitive and innovative perspective. </p><p>However, watching how we have failed to do something similar around Privacy will leave those of us watching this AI regulatory battle with a sense of d&#233;j&#224; vu. </p><h3><a href="https://siliconangle.com/2025/07/03/europes-biggest-companies-call-two-year-pause-eus-landmark-ai-act/">Europe&#8217;s Biggest Companies Call for a Two-Year Pause on EU&#8217;s Landmark AI Act</a></h3><p>Not to be left out of the conversation, our friends in the EU saw action on AI regulation recently, too. A coalition of Europe&#8217;s largest companies asked for a two-year freeze on the implementation of the EU&#8217;s AI Act, citing concerns it could impede the EU&#8217;s ability to keep pace with China and the U.S. </p><p>It will be very interesting to see how this plays out, given the EU by its own admission in some ways has set out to be a &#8220;regulatory superpower&#8221; despite many concerns from national and industry leaders alike who state the heavy handed compliance approach of t he EU is impacting the EU&#8217;s ability to compete and also its economic prosperity and national security.</p><p>And, right on cue, as expected, EU leaders stated &#8220;<strong><a href="https://www.reuters.com/world/europe/artificial-intelligence-rules-go-ahead-no-pause-eu-commission-says-2025-07-04/">No pause for the EU AI Act Implementation timeline</a></strong>s&#8221;. </p><p>The EU government and bureaucracy seem to be committed to this path, regardless of the impact on economics or national security.</p><blockquote><p><strong>"I've seen, indeed, a lot of reporting, a lot of letters, and a lot of things being said on the AI Act. Let me be as clear as possible, there is no stop the clock. There is no grace period. There is no pause," Commission spokesperson Thomas Regnier told a press conference.</strong></p></blockquote><p>I always enjoy sharing the below diagram as a stark reminder of just how different the US and EU ecosystem for growth and high-tech are:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IZr_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IZr_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 424w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 848w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 1272w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IZr_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png" width="1456" height="893" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:893,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3122409,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IZr_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 424w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 848w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 1272w, https://substackcdn.com/image/fetch/$s_!IZr_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcca63fb4-8138-4f1b-9b39-fab0984ae5f2_3064x1880.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://spear-invest.com/primers/cybersecurity-primer">The Rise of the Agentic SOC</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IreL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IreL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 424w, https://substackcdn.com/image/fetch/$s_!IreL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 848w, https://substackcdn.com/image/fetch/$s_!IreL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 1272w, https://substackcdn.com/image/fetch/$s_!IreL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IreL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png" width="1456" height="1097" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1097,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:725359,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IreL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 424w, https://substackcdn.com/image/fetch/$s_!IreL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 848w, https://substackcdn.com/image/fetch/$s_!IreL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 1272w, https://substackcdn.com/image/fetch/$s_!IreL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fa90b8c-639f-409f-b25c-581d371ca8ed_1526x1150.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The industry continues to be enamored by AI's potential to transform cybersecurity, including in key areas such as SecOps with the SOC. This piece from Spear Investments explores the topic, looking at technical and market factors driving this focus. </p><p>The piece emphasizes what is foundational to Agentic SOC operations, which are the data sources and data infrastructure layer. As seen in the image above, this is no small feat and often involves a complex combination of systems, products, and environments to bring things together. As the authors point out, the modern SOC isn&#8217;t a static dashboard, but instead a system built on robust real-time data sources providing actionable insights, and can come from sources such as the network, endpoints, identity, and cloud environments. </p><p>The industry leaders, such as Crowdstrike and ZScaler, have a significant advantage when it comes to data, given each protects billions of digital assets and/or processes billions and even trillions of transactions, providing them a massive data set to drive higher fidelity insights and even further train models tied to products. This data &#8220;moat&#8221; is a point the CEO of Horizon3AI, whom I respect, has often cited as key. </p><p>From an investor&#8217;s perspective, each of these areas of the cyber market has and continues to see double-digit growth annually, as depicted below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XnWj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XnWj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 424w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 848w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 1272w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XnWj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:556236,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XnWj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 424w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 848w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 1272w, https://substackcdn.com/image/fetch/$s_!XnWj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb84f8b80-795f-4e9e-98ed-7c91b65f9d67_1626x976.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The piece goes on to break down each of these key cybersecurity end markets, leading vendors, disruptors, and the complexity involved within each category defined above. It then discusses how they all provide insights key to powering the future agentic SOC.</p><h3><a href="https://arxiv.org/pdf/2506.23034">Can LLMs Develop Secure Code?</a></h3><p>As it turns out, <em><strong>it depends</strong></em>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ivMf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ivMf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 424w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 848w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 1272w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ivMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png" width="545" height="343.5151515151515" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:624,&quot;width&quot;:990,&quot;resizeWidth&quot;:545,&quot;bytes&quot;:193226,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ivMf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 424w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 848w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 1272w, https://substackcdn.com/image/fetch/$s_!ivMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77c19fb7-d81e-4b0a-a7bf-bf73a7272974_990x624.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A recent paper found that smaller specialized models, coupled with security-centric prompting and guidance, can develop more secure code. While the results seem promising, I inevitably think about reality versus academia and research.<br><br>The truth is that most developers have little security education and training and won't natively use security-centric prompts and requests, as this paper outlines.</p><p>This means the attack surface is poised to grow exponentially as Developers use vanilla prompts for code generation with little to no context added for security and hardened code, inherently trusting whatever the models output for the sake of moving fast, as developers are incentivized to do.<br><br>I suspect that in the future, we will see the everyday use of tools and secure coding prompt libraries to implement guardrails, allowing developers to lean into AI-driven development while also ensuring more secure outputs. Shout out to <strong><a href="https://www.linkedin.com/in/ACoAAABch_EB2-xKAh_gkz9Jpr7ISx1JFpuljOw">Varun Badhwar</a></strong> for also bringing this paper to my attention.</p><h1>AppSec, Vulnerability Management &amp; Software Supply Chain </h1><h3><a href="https://www.chainguard.dev/unchained/this-shit-is-hard-vulnerability-scanner-integration?utm_campaign=chris-hughes">This Sh*t Is Hard: Vulnerability Scanner Integration</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ywt0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ywt0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 424w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 848w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ywt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png" width="222" height="290.0502512562814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:796,&quot;resizeWidth&quot;:222,&quot;bytes&quot;:821578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ywt0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 424w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 848w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 1272w, https://substackcdn.com/image/fetch/$s_!ywt0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32bf0504-6ef2-4c5f-b34b-14edd753dca4_796x1040.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Continuing their series about activities that are difficult behind the scenes that organizations grapple with, Chainguard recently released a piece discussing vulnerability scanner integration. </p><p>They outline the challenges of dealing with multiple vulnerability databases, which often have duplicative information, conflicting data, and disparate IDs, making vulnerability scanning and management difficult. Chainguard also describes its internal processes and the tools it uses to identify and communicate vulnerabilities to customers. This activity leads to remediating vulnerabilities, communicating changes to customers in advisories, and providing context-rich information from which scanners can pull. </p><p>Chainguard summarizes the difficulties, including the reality that there are tens of thousands of vulnerabilities every year, many captured in NVD and other vulnerability databases, many different vulnerability scanning tools, the need for context, and much more.</p><p>This blog is a great peek behind the curtain of vulnerability management as a software vendor.</p><h3><a href="https://www.oligo.security/blog/the-application-attack-matrix">The Application Attack Matrix &#129512;</a></h3><p>Several of the industry-leading reports, from M-Trends to DBIR, show that application exploits are on the rise as one of the most dominant attack vectors.<br><br>However, the AppSec landscape has changed drastically in the last several years, from Cloud, Microservices, Supply Chain, Runtime, App Logic, and AI &#129302;. This Application Attack Matrix from <strong><a href="https://www.linkedin.com/in/ACoAACLmZ78BOWD43aGIwGnAQvhYIRC-hGX5JT8">Avi Lumelsky</a></strong>, <strong><a href="https://www.linkedin.com/in/ACoAADAUenMBYR7ci6XkfEwu6MT8iOKGYoRRaIY">Hadas Marzook</a></strong>, <strong><a href="https://www.linkedin.com/in/ACoAADLpI0cB1RhRRTPHQPGpofBYHjKgfJDr0Nc">Gal Elbaz</a></strong>, and the <strong><a href="https://www.linkedin.com/company/oligo-security/">Oligo Security</a></strong> crew is timely. <br><br>It looks at the four phases of application attacks: Pre-Intrusion, Intrusion, Post-Intrusion, and Impact. It's tied to real-world security incidents and attacks using various attack techniques and their associated organizational impacts.<br><br>This is a great resource that security practitioners, leaders, researchers, and others can leverage. It is grounded in real-world data and accompanying mitigation techniques and can lead to a more resilient digital ecosystem!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CY2_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CY2_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 424w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 848w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 1272w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CY2_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png" width="1456" height="577" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:577,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2484494,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CY2_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 424w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 848w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 1272w, https://substackcdn.com/image/fetch/$s_!CY2_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb0e6ef8-84bc-4f8d-ba45-38fcd21b4715_2282x904.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vUc1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vUc1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 424w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 848w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 1272w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vUc1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png" width="1456" height="871" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:871,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:656974,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vUc1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 424w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 848w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 1272w, https://substackcdn.com/image/fetch/$s_!vUc1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F30ebbbe8-a7f3-48ec-8e56-d1db302ed413_2250x1346.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://github.com/Cybr-Inc/fwdcloudsec-2025-summaries">fwd:cloudsec Summaries</a></h3><p>One of the leading cloud security conferences of the year recently took place, bringing together industry-leading experts with deep experience in various CSPs, multi-cloud, identity, AppSec, and more.</p><p>The playlist is live, but it can be difficult to keep up with, with 43 talks covering various topics and domains. Luckily, this repository puts it all together neatly and well organized, allowing you to focus on the most interesting topics. It breaks the 43 talks down into the following categories:</p><ul><li><p><strong>AI/ML Security</strong></p></li><li><p><strong>IAM</strong></p></li><li><p><strong>Threat Hunting and Detection</strong></p></li><li><p><strong>Attack Techniques and Vulnerabilities</strong></p></li><li><p><strong>Cloud Infrastructure and Architecture </strong></p></li></ul><h3><a href="https://aws.plainenglish.io/aws-detection-engineering-mastering-log-sources-for-threat-detection-51372da9a17e">From AWS Detection Deficit to Detection Maturity</a></h3><p>Building robust and effective detection capabilities in leading CSPs such as AWS can be a complex endeavor, even for the most capable teams. This incredible blog detailing how one team identified their AWS detection deficits and matured them while diving deep into AWS log sources and telemetry is helpful for any security practitioner securing workloads in AWS. </p><p>The below image helps highlight the AWS services involved, both from a data source, monitoring, and aggregating perspective.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m1oa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m1oa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 424w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 848w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 1272w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m1oa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png" width="1456" height="1006" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1006,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1350656,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m1oa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 424w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 848w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 1272w, https://substackcdn.com/image/fetch/$s_!m1oa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3376429-475a-4dc8-8107-24643c48ba5b_1978x1366.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The author lays out an AWS Log Source Security Summary:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I1eG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I1eG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 424w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 848w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 1272w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I1eG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png" width="1456" height="327" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:327,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:934280,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167585428?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!I1eG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 424w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 848w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 1272w, https://substackcdn.com/image/fetch/$s_!I1eG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcda6bcff-981d-4c70-9cfe-108655bec5ef_3112x698.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>They discuss how they built out detections and enriched log sources with additional information such as network context and threat intelligence, where possible, to provide deeper insights.</p><p>Their journey captures key lessons as well:</p><ul><li><p>Context is everything, and raw logs must be enriched with context</p></li><li><p>Automation is key, due to the scale and complexity of environments</p></li><li><p>False positives kill</p></li><li><p>Insights are hidden in the cross-service correlation</p></li><li><p>Use IaC to manage detection rules</p></li><li><p>Continuously validate detection rules because they degrade over time</p></li></ul><h3><a href="https://youtu.be/81M86g-Cje0?si=XRffrlAeSXPh-6Uf">Non-Human Identity (NHI) Discussion</a></h3><div id="youtube2-81M86g-Cje0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;81M86g-Cje0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/81M86g-Cje0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>NHI&#8217;s continue to be a hot topic, and something I have written and spoken a lot about, including with my friends at <strong><a href="https://astrix.security/">Astrix Security</a></strong>. That said, I found this discussion with investor Pramod Gosavi and the founder of Clutch Security to be a good one, covering a wide range of topics related to NHI&#8217;s, such as: </p><ul><li><p>How NHI&#8217;s are an old problem but being newly recognized as critical</p></li><li><p>Limitations of traditional secrets management tooling</p></li><li><p>What NHI attack vectors and breach mechanics look like</p></li><li><p>The impact of Agentic AI on NHI</p></li><li><p>Clutch&#8217;s vision for this space, and where they&#8217;re headed</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #54]]></title><description><![CDATA[GRC Engineering, State of AI Report, Predicting AI&#8217;s Impact on Cyber, SAIL Framework & AI, and Secure Code Generation]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-54</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-54</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 03 Jul 2025 11:50:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dEfg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome! </h1><p>Welcome to issue #54 of the Resilient Cyber Newsletter.</p><p>We&#8217;re heading into the 4th of July weekend, and I&#8217;m heading up to Northern VA where my son will be participating in the Virginia State Little League Baseball championships, which should be a lot of fun for our family.</p><p>I hope everyone has a great holiday weekend and take time to reflect on the significance of the holiday for those of us in the U.S.</p><p>All that said, we have a lot of great resources this week from conversations on GRC Engineering and its impact on compliance, a comprehensive state of AI report, the introduction of a new AI secure lifecycle framework and discussions about AI&#8217;s impact on AppSec, so here we go!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dEfg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dEfg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 424w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 848w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dEfg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png" width="557" height="386.76304945054943" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1011,&quot;width&quot;:1456,&quot;resizeWidth&quot;:557,&quot;bytes&quot;:2565069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dEfg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 424w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 848w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 1272w, https://substackcdn.com/image/fetch/$s_!dEfg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ad2f656-690f-4067-80bc-a9ccb50154cb_1630x1132.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NlVi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NlVi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NlVi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg" width="1456" height="563" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:563,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:632161,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NlVi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NlVi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8fbe8a7-69b7-4072-8a51-4647b01329f9_2432x940.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Navigating M&amp;A: What every security leader needs to know</h3><p>M&amp;A is exciting &#8211; new products, new colleagues, new possibilities. Often overlooked, cybersecurity can make or break the success of a deal. Acquirers often face fragmented systems, different security policies, and new vulnerabilities. These issues introduce real security risks.</p><p>On July 17th, CISOs Dave Lewis, Wendy Nather, and Kane Narraway draw on the collective experience of 30+ M&amp;As to <a href="https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?utm_source=influencer&amp;utm_medium=paid_newsletter&amp;utm_campaign=sa_enterprise_amer_english_cybersecurity-for-mergers-acquisitions_consideration_2025-07&amp;utm_content=text&amp;utm_term=july-3-resilientcyber-newsletter-primary">examine the security implications of M&amp;A</a> and outline <a href="https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?utm_source=influencer&amp;utm_medium=paid_newsletter&amp;utm_campaign=sa_enterprise_amer_english_cybersecurity-for-mergers-acquisitions_consideration_2025-07&amp;utm_content=text&amp;utm_term=july-3-resilientcyber-newsletter-primary">strategies for mitigating risk</a>.</p><p>Join the <a href="https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?utm_source=influencer&amp;utm_medium=paid_newsletter&amp;utm_campaign=sa_enterprise_amer_english_cybersecurity-for-mergers-acquisitions_consideration_2025-07&amp;utm_content=text&amp;utm_term=july-3-resilientcyber-newsletter-primary">webinar</a> for practical advice on:</p><ul><li><p>What to evaluate during due diligence, and how to prioritize risks.</p></li><li><p>How to approach access control across fragmented systems.</p></li><li><p>How to respond to growing risks like social engineering and insider threats.</p></li><li><p>How compliance adherence becomes more complex&#8212;and the first steps you should take</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?utm_source=influencer&amp;utm_medium=paid_newsletter&amp;utm_campaign=sa_enterprise_amer_english_cybersecurity-for-mergers-acquisitions_consideration_2025-07&amp;utm_content=text&amp;utm_term=july-3-resilientcyber-newsletter-primary&quot;,&quot;text&quot;:&quot;Register for the Webinar&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://1password.com/webinars/cybersecurity-for-mergers-acquisitions?utm_source=influencer&amp;utm_medium=paid_newsletter&amp;utm_campaign=sa_enterprise_amer_english_cybersecurity-for-mergers-acquisitions_consideration_2025-07&amp;utm_content=text&amp;utm_term=july-3-resilientcyber-newsletter-primary"><span>Register for the Webinar</span></a></p></li></ul></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.resilientcyber.io/p/resilient-cyber-w-aj-yawn-transforming">Resilient Cyber w/ AJ Yawn - Transforming Compliance Through GRC Engineering</a></h3><p>In this episode, we sat down with AJ Yawn, Author of the upcoming book GRC Engineering for AWS and Director of GRC Engineering at Aquia, to discuss how GRC engineering can transform compliance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hTQv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hTQv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 424w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 848w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 1272w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hTQv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png" width="372" height="373.2774725274725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1461,&quot;width&quot;:1456,&quot;resizeWidth&quot;:372,&quot;bytes&quot;:4097100,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hTQv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 424w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 848w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 1272w, https://substackcdn.com/image/fetch/$s_!hTQv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea586a8f-bb6f-4fa0-9cf4-0dd3406ad7cf_1756x1762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We discussed the current pain points and challenges in Governance, Risk, and Compliance (GRC), how GRC has failed to keep up with software development and the threat landscape, and how to leverage cloud-native services, AI, and automation to bring GRC into the digital era.</p><div id="youtube2-yZpieN6uHVs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;yZpieN6uHVs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/yZpieN6uHVs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>We dove into:</p><ul><li><p>What the phrase &#8220;GRC Engineering&#8221; means and how it differs from traditional Governance, Risk and Compliance</p></li><li><p>What some of the major issues are with traditional compliance in the age of DevSecOps, Cloud, API&#8217;s, Automation and now AI</p></li><li><p>Specific examples of GRC Engineering, including the use of automation, API&#8217;s and cloud-native services to streamline security control implementation, assessment and reporting</p></li><li><p>The promise and potential of AI in GRC, and how AJ is using various models for control assessments, artifact creation and more, and how GRC practitioners should be leveraging AI as a force multiplier</p></li><li><p>AJ&#8217;s new book &#8220;<strong><a href="https://a.co/d/3C8NHIf">GRC Engineering For AWS: A Hands-On Guide to Governance, Risk and Compliance Engineering</a></strong>&#8221;</p></li></ul><h3><a href="https://www.iconiqcapital.com/growth/reports/2025-state-of-ai">The State of AI Report: The Builder&#8217;s Playbook</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QUCY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QUCY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 424w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 848w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 1272w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QUCY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png" width="1456" height="406" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:406,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3204659,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QUCY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 424w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 848w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 1272w, https://substackcdn.com/image/fetch/$s_!QUCY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17cfd401-7d5e-406b-a178-9c76fbc81c78_2546x710.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While this is an AI focused resource, I feel it makes more sense in this section of the newsletter due to the emphasis on the broader market dynamics, startups, incumbents, investors and more. </p><p>This &#8220;State of the AI Report&#8221; from Iconiq is one of the best resources I have seen so far in 2025 on this front. It claims to lay out a practical roadmap for AI innovation and it does so in my opinion, while also providing deep insights on the evolution, adoption and future implementation of AI, much of which is very relevant to security as well. </p><p>In fact, Security ranks among the top 5 challenges for those deploying models, in addition to issues such as Hallucinations, Explainability and Trust, all of which I would argue are directly related to security, and have security implications, such as package hallucinations which I discussed last week.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q7Nn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 424w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 848w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 1272w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png" width="1456" height="760" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/15344521-11bf-4d13-9694-874de45ea470_2742x1432.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:760,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:405231,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 424w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 848w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 1272w, https://substackcdn.com/image/fetch/$s_!Q7Nn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F15344521-11bf-4d13-9694-874de45ea470_2742x1432.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Agents of course are a hot topic, with 80%+ of organizations reporting they are either actively deploying agents, experimenting with doing so, or in the early research phases. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!maz3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!maz3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 424w, https://substackcdn.com/image/fetch/$s_!maz3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 848w, https://substackcdn.com/image/fetch/$s_!maz3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 1272w, https://substackcdn.com/image/fetch/$s_!maz3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!maz3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png" width="1456" height="707" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:707,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:419840,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!maz3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 424w, https://substackcdn.com/image/fetch/$s_!maz3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 848w, https://substackcdn.com/image/fetch/$s_!maz3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 1272w, https://substackcdn.com/image/fetch/$s_!maz3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41b50bf6-f857-4533-a8d8-43e8da5b183d_2740x1330.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The report shares a TON of other insights related to spending, hiring, costs related to AI initiatives, budget allocations and more. Another key insight shared was that coding assistants by and far were the leading use cases in terms of impact on productivity, which has major ramifications for AppSec, as we know with the rise of vibe coding, and just the implicit trust developers place in code generated by LLMs and coding assistants. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TqoI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TqoI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 424w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 848w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 1272w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TqoI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png" width="1456" height="774" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:774,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:415645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TqoI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 424w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 848w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 1272w, https://substackcdn.com/image/fetch/$s_!TqoI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c9ae049-1583-4e1d-9cf9-61d817b7391e_2828x1504.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For a deep dive on the implications of coding assistants, I recommend a recent article from Dave Aitel and Dan Geer titled &#8220;<strong><a href="https://www.lawfaremedia.org/article/ai-and-secure-code-generationhttps://www.lawfaremedia.org/article/ai-and-secure-code-generationhttps://www.lawfaremedia.org/article/ai-and-secure-code-generation">AI and Secure Code Generation</a></strong>&#8221; or my own article titled &#8220;<strong><a href="https://www.resilientcyber.io/p/securitys-ai-driven-dilemma">Security&#8217;s AI-Driven Dilemma</a></strong>&#8221;. </p><h3><a href="https://www.crn.com/news/security/2025/the-10-hottest-cybersecurity-startups-of-2025-so-far?page=10&amp;itc=refresh">The 10 Hottest Cyber Startups of 2025</a></h3><p>If you&#8217;re like me, you often don&#8217;t give a ton of credibility to the &#8220;Top&#8221; lists that come out, however some are worth paying attention to. One is CRN, which recently named the leading up-and-coming companies that are offering new approaches to securing cloud, data, AI and identities. </p><p>Among those cited include <strong><a href="https://www.endorlabs.com/">Endor Labs</a></strong> and <strong><a href="https://www.oligo.security/">Oligo</a></strong>, the former of which I currently serve as the Chief Security Advisor, and the latter I&#8217;ve had a chance to interact with quite a bit and are leading the charge around runtime security and Application Detection and Response (ADR), as well as doing some amazing research, including breaking news of a vulnerability to Apple around RSA.</p><h3><a href="https://www.axios.com/2025/06/27/aviation-transportation-sector-cyberattacks-scattered-spider">Scattered Spider Hacking Group Now Targeting Airlines and Transportation</a></h3><p>News broke last week that the notorious hacking group &#8220;Scattered Spider&#8221; is targeting aviation and transportation sectors with some such as Canadian airline &#8220;WestJet&#8221; already seeing some outages to its system and mobile application.</p><p>The news and guidance has come from credible sources such as Charles Carmakal, who serves as the CTO for Google&#8217;s Mandiant Consulting. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PnfM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PnfM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 424w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 848w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PnfM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png" width="463" height="301.7767857142857" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:949,&quot;width&quot;:1456,&quot;resizeWidth&quot;:463,&quot;bytes&quot;:2416269,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PnfM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 424w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 848w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 1272w, https://substackcdn.com/image/fetch/$s_!PnfM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac322de8-3935-4046-8b6a-fd0e82785b0a_1568x1022.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://medium.com/@csima/predicting-ais-impact-on-security-94f0c31c800c">Predicting AI&#8217;s Impact on Security</a></h3><p>If you&#8217;re like me, you likely read, listen to and consume as much as you can related to the intersection of AI and cybersecurity. That said, it can be a lot, from startups, VC&#8217;s, the need to secure AI as well as using AI for security use cases. </p><p>One of the top leaders I follow is Caleb Sima, who produces a lot of excellent content on the topic. He recently put out a Medium article titled &#8220;Predicting AI&#8217;s Impact on Security&#8221; which I found informative and resonated with a lot of my thinking on the topic as well. </p><div id="youtube2-iMAPvjgahHY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;iMAPvjgahHY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/iMAPvjgahHY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>During the article (and associated talk), Caleb makes the case that AI has the potential to &#8220;revolutionize&#8221; cyber by addressing key challenges in coverage, context and communication. He sees AI being able to help CISO&#8217;s in areas where systemic challenges exist such as vulnerability management, third-party incidents, IAM and more, while also helping with more mundane activities from internal documentation, meeting transcription and more. </p><p>As organizations engineering practices change to adapt to AI, the security landscape will need to change alongside it, both in terms of tools and technologies but also practices and methodologies as well.</p><h3><a href="https://www.chemistry.vc/post/ai-for-security">AI for Security: It&#8217;s time to get over our trust issues</a></h3><p>Anyone who&#8217;s been paying attention to the AI discussion in cybersecurity knows it involves two angles:</p><ul><li><p>Securing the use of AI</p></li><li><p>Using AI <em><strong>for</strong></em> Security</p></li></ul><p>The latter of course has been a much harder conversation for many security practitioners, as they&#8217;re rightfully concerned with the security implications of AI adoption. That said, many should equally be concerned with the prospects of what AI can do for security, a point I tried to make in my own article titled &#8220;<strong><a href="https://www.resilientcyber.io/p/securitys-ai-driven-dilemma">Security&#8217;s AI-Driven Dilemma: A discussion on the rise of AI-driven development and security&#8217;s challenge and opportunity to cross the chasm</a></strong>&#8221;. </p><p>In that article I argued that security is historically a late adopter and laggard of technological waves, but AI offers an opportunity for cyber to be an early adopter and innovator, and to use the technology to address longstanding cyber issues. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!peyE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!peyE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 424w, https://substackcdn.com/image/fetch/$s_!peyE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 848w, https://substackcdn.com/image/fetch/$s_!peyE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 1272w, https://substackcdn.com/image/fetch/$s_!peyE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!peyE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png" width="506" height="239.44642857142858" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:689,&quot;width&quot;:1456,&quot;resizeWidth&quot;:506,&quot;bytes&quot;:623004,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!peyE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 424w, https://substackcdn.com/image/fetch/$s_!peyE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 848w, https://substackcdn.com/image/fetch/$s_!peyE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 1272w, https://substackcdn.com/image/fetch/$s_!peyE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F526062f0-78b3-4a8a-b875-19399e1e4adb_2016x954.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>VC firm Chemistry makes a similar point in an recent article discussing how security needs to get over its trust issues and lean into adopting AI to aid security use cases. They point out examples from VulnMgt, AppSec, Email Security and more, along with vendors operating in those spaces (albeit likely with some bias for their portfolio companies). </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aB1T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aB1T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 424w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 848w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 1272w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aB1T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png" width="648" height="362.27472527472526" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:648,&quot;bytes&quot;:460883,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aB1T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 424w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 848w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 1272w, https://substackcdn.com/image/fetch/$s_!aB1T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F610b68ba-c025-440c-b82e-50485584d2b4_1478x826.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This piece lays out the various areas where AI is and will have an impact, tackling challenges around vulnerability backlogs, GRC artifacts and processes, SecOps alert fatigue, identity security and more. I agree with the authors and I&#8217;m excited about the prospect of AI in cyber.</p><h3><a href="https://www.pillar.security/sail">Secure AI Lifecycle (SAIL) Framework</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CO01!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CO01!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 424w, https://substackcdn.com/image/fetch/$s_!CO01!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 848w, https://substackcdn.com/image/fetch/$s_!CO01!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 1272w, https://substackcdn.com/image/fetch/$s_!CO01!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CO01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png" width="400" height="333.7912087912088" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1215,&quot;width&quot;:1456,&quot;resizeWidth&quot;:400,&quot;bytes&quot;:188136,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CO01!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 424w, https://substackcdn.com/image/fetch/$s_!CO01!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 848w, https://substackcdn.com/image/fetch/$s_!CO01!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 1272w, https://substackcdn.com/image/fetch/$s_!CO01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ace169d-f0bb-489b-8cf1-d2dd64f86241_1630x1360.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>With the rapid adoption and evolution of AI teams are often looking. for a framework to help turn principles and guidance into action.<br><br>Excited to have collaborated with the <strong><a href="https://www.linkedin.com/company/pillarsecurity/">Pillar Security</a></strong> team on this publication, which I think is a helpful tool for security and software practitioners building with and on AI systems. From executable data in the form of prompts, agency via Agentic AI and nuanced angles to consider such as model poisoning and more.<br><br>The paper:<br><br>&#128311; Lays out the AI development lifecycle and AI security landscape<br>&#128311; Maps more than 70 risks across various AI development and deployment phases<br>&#128311; Provides mitigations, mapped to leading frameworks such as ISO and NIST AI RMF<br>&#128311; Captures a comprehensive definition of AI system components</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kZMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kZMB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 424w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 848w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 1272w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kZMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png" width="424" height="340.9230769230769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1108,&quot;width&quot;:1378,&quot;resizeWidth&quot;:424,&quot;bytes&quot;:131982,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kZMB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 424w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 848w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 1272w, https://substackcdn.com/image/fetch/$s_!kZMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe9cf1fe9-d649-4547-9533-aebdd1f22056_1378x1108.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://adversa.ai/blog/asana-ai-incident-comprehensive-lessons-learned-for-enterprise-security-and-ciso/">Asana AI Incident: Comprehensive Lessons Learned for Enterprise Security and CISOs</a></h3><p>We recently saw incident involving Asana AI, which helps enable organizations with AI assistants. The incident impacted over 1,000 organizations data through a single line of code. This equates to 0.8% of Asana&#8217;s 130,000 enterprise customers.</p><p>This piece from Adversa AI breaks the incident down, which is tied to MCP, which we&#8217;ve seen rapid adoption and implementation of, despite many security practitioners and researchers also raising security concerns. </p><p>The blog does a great job summarizing key impact metrics, what was at risk and why this matters to CISO&#8217;s below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_vEm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_vEm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 424w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 848w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 1272w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_vEm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png" width="530" height="481.95054945054943" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1324,&quot;width&quot;:1456,&quot;resizeWidth&quot;:530,&quot;bytes&quot;:424076,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/167002110?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_vEm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 424w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 848w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 1272w, https://substackcdn.com/image/fetch/$s_!_vEm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e74767-0f48-42bc-8ec2-fe5939b3bb03_2028x1844.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As the blog points out, the crux of the issue is that via the Asana MCP server, Organization A was able to query cached results from Organization B via a &#8220;confused deputy bug&#8221; in the MCP server, that doesn&#8217;t re-verify tenant context for cached responses, as well as a missing identity management piece for AI agents (a hot topic I have been talking quite a bit about). </p><p>The blog dives much deeper in terms of who was involved, the specifics of the incident, and the technical details. It is worth a read.</p><h3><a href="https://youtu.be/mYKMwZcGynw?si=UXk743eHc5C7gS2I">Intro to OAuth for MCP Servers with Aaron Parecki</a></h3><p>There&#8217;s been a lot of fuzz about Authentication/Authorization when it comes to MCP among its rapid adoption. One of the key folks leading that thought leadership is Aaron Parecki at Okta, who has authored several crucial blogs on the topic as well as leading improvements for the MCP spec itself. </p><p>I stumbled across this session Aaron delivered at the MCP Developers Summit, and I recommend giving it a listen if you&#8217;re looking to better understand MCP and OAuths intersection. </p><div id="youtube2-mYKMwZcGynw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;mYKMwZcGynw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/mYKMwZcGynw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://venturebeat.com/ai/nvidias-ai-factory-narrative-faces-reality-check-at-transform-2025/">AI Supply Chain Constraints</a></h3><p>While not a specific security topic, supply chain constraints can impact things such as availability and internal business AI initiatives. This piece from Venture Beat discusses an uncomfortable open dialogue that is happening more and more. </p><p>This includes situations where leaders such as Anthropic, Cursor and OpenAI are seeing significant ARR growth but users are being constraints via API limitations and token shortages due to limits in power supply capacity, building permits, data centers, and high-end chip manufacturing. </p><p>It dubbed it as &#8220;the capacity crisis no one talks about&#8221; and provides direct quotes from industry leaders about the token constraints they&#8217;re facing from leading providers as well as varying quality among the model providers. It is partially being driven by model providers using techniques to improve inference costs, only to suffer downstream quality impacts on model outputs. </p><blockquote><p><strong>&#8220;Each optimization degrades model performance in ways enterprises may not detect until production fails&#8221;</strong></p></blockquote><p>With my security hat on, I could see the implications for everything from AI-driven development and vulnerable code to effectiveness and accuracy related to SecOps use cases of AI. </p><p>The article quotes comparisons to early oil competitions with leaders such as Standard Oil and others, with some diluting quality, suspecting customers won&#8217;t notice, only for the measures to have real ramifications on society and the consumers of the products.</p><p>They cite immediate imperatives for enterprise buyers as follows:</p><ul><li><p>Establish quality benchmarks before selecting providers.</p></li><li><p>Audit existing inference partners for undisclosed optimizations.</p></li><li><p>Accept that premium pricing for full model fidelity is now a permanent market feature.</p><blockquote><p><strong>Quality variance, the difference between 95% and 100% accuracy, determines whether your AI applications succeed or catastrophically fail.</strong></p></blockquote></li></ul><h1>AppSec, Vulnerability Management, and Software Supply Chain</h1><h3><strong><a href="https://www.lawfaremedia.org/article/ai-and-secure-code-generation">AI and Secure Code Generation</a></strong></h3><p>This piece on Lawfare from longtime industry leaders Dave Aitel and Dan Geer is a great read about the intersection of AI and AppSec. As they say:</p><blockquote><p><strong>&#8220;AI is reshaping code security - shifting metrics, unknown bugs, and autonomous decisions humans may never understand&#8221;.</strong></p></blockquote><p>In the article they discuss the massive impact AI is on having on software development, from both finding and fixing bugs, vulnerabilities becoming immediately and transparently visible (e.g. From N-Day to Every-Day Vulnerabilities) and the impact that Autonomy will have on the ecosystem. </p><p>The authors make the case for provenance standards for AI generated code, similar to SBOM&#8217;s, but tracking models, prompts and datasets which can be helpful in auditing the security of largely AI-written codebases. I will point out that some of this is underway by groups such as OWASP&#8217;s CycloneDX and folks such as Helen Oakley. I actually explored the topic with her in an episode titled &#8220;<strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-helen-oakley-exploring">Exploring the AI Supply Chain</a></strong>&#8221;.</p><div id="youtube2-huN8sIiXRYY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;huN8sIiXRYY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/huN8sIiXRYY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://www.linkedin.com/pulse/can-we-fix-all-vulnerabilities-josh-bressers-3pc0c/?trackingId=Z1C9L0jA39RGEZr%2BujggkQ%3D%3D">Can we fix all the vulnerabilities?</a></h3><p>Much of the discussion in AppSec revolves around fixing &#8220;all the things&#8221;, scanner findings, vulnerabilities, misconfigurations, weaknesses and so on. This piece from Josh Bressers discusses the practical implications of trying to fix all of the vulnerabilities. </p><p>He starts by discussing how zero CVE base images are all the rage right now, and rightfully so, as we should build from secure base images. That said, when it comes to dependencies in images and keeping those in a constant state of zero findings is another story and many organizations instead optimize for their assessment or audit schedule as opposed to truly zero findings perpetually. </p><p>There are also operational challenges to navigate such as breaking things due to dependency changes or only updating dependencies that have associated vulnerabilities. </p><p>The question at its core is misguided because you&#8217;re really asking, can we eliminate all risk, and the answer is sure, if you want to prioritize above everything else and redirect resources that could be spent better for the organziation. </p><p>That&#8217;s why we have what&#8217;s called risk tolerance, and it looks different for each organization.</p><h3><a href="https://www.linkedin.com/pulse/just-because-theres-cve-doesnt-mean-youre-safe-one-its-kavitha-daula-lkrqe/?trackingId=uOY44jzGTV9xL1eifUiZBA%3D%3D">Just Because There&#8217;s No CVE Doesn&#8217;t Mean You&#8217;re Safe - And Just Because There Is One Doesn&#8217;t Mean It&#8217;s Bad</a></h3><p>VP of Engineering at Edera recently published a good piece diving into the nuances of CVE&#8217;s and that their mere presence doesn&#8217;t mean things or bad, and conversely, their absence doesn&#8217;t mean you&#8217;re safe. This is a point known by many with deep AppSec expertise and experience but it is worth discussing nonetheless. </p><p>As Kavita discusses, fixing CVE&#8217;s alone doesn&#8217;t mean your safe or secure, and conversely a lack of them doesn&#8217;t mean all risks have been eliminated. As she notes, vulnerabilities may not be assigned CVE ID&#8217;s, same for a software bug, insecure default configurations and more.</p><p>Lately many incidents have started with hardcoded credentials in container images or source code for example. On the flip side, we know 95%~ of CVE&#8217;s annually are <em><strong>never exploited</strong></em> and pose little to no operational risks to organizations as well.</p><p>Like everything in cyber, and life - context is key.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #52]]></title><description><![CDATA[2025 Cyber Comp, Responsibility and Structure Results, SMB Security Budgets, Benchmarking LLMs for Alert Triage and Red Teaming, Next-Gen AI-Native Pen Testing & AWS Threat Technique Catalog]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-52</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-52</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 19 Jun 2025 14:55:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!o5rP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome</h1><p>Welcome to issue #52 of the Resilient Cyber Newsletter. This marks one whole year since I embarked on the journey to begin a newsletter for the community focused on Cyber Market Dynamics, Leadership, AI, AppSec, Vulnerability Management, and Software Supply Chain Security.</p><p>I have been sharing resources, thoughts, discussions, and more with the community primarily on LinkedIn for roughly a decade, but I never formalized storing all of the resources and making them available on a weekly basis&#8212;until now!</p><p>If you&#8217;ve been on this journey with me for the past year, I truly appreciate your support. I hope you&#8217;ve enjoyed the resources and shared them with your network. We work in a highly dynamic, quickly changing field, especially with AI and its intersection with cybersecurity, and I&#8217;m learning alongside the community every day.</p><p>Below is another excellent collection of timely and relevant resources, and I look forward to continuing to share many more in the coming weeks and years.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o5rP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o5rP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 424w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 848w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 1272w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o5rP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png" width="500" height="355.7692307692308" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1036,&quot;width&quot;:1456,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:2392046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o5rP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 424w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 848w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 1272w, https://substackcdn.com/image/fetch/$s_!o5rP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77b9c618-20f0-4a6f-ba46-6dd2f7064441_1532x1090.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X9CR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X9CR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 424w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 848w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 1272w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X9CR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png" width="532" height="45.67307692307692" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:125,&quot;width&quot;:1456,&quot;resizeWidth&quot;:532,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X9CR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 424w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 848w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 1272w, https://substackcdn.com/image/fetch/$s_!X9CR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a003822-1132-4b9e-979c-fdab727ac4a1_1600x137.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Secure Kubernetes Environments with Cortex Cloud&#8217;s KSPM</h3><p>Managing Kubernetes can be complex. Misconfigurations, hidden vulnerabilities, and leaked secrets can turn clusters into gateways for attackers.</p><p><a href="https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-a-practitioners-guide-to-kspm/">Cortex Cloud&#8217;s Kubernetes Security Posture Management (KSPM)</a> helps security teams identify misconfigurations, vulnerabilities, malware and secrets across code, build, deploy and runtime.</p><p>Interactive dashboards show your full asset inventory, rank the riskiest clusters, and highlight critical findings. Click straight through to investigate and remediate without jumping between tools.</p><p>Follow proven <a href="https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-a-practitioners-guide-to-kspm/">best practices</a> and <a href="https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-a-practitioners-guide-to-kspm/">integrate KSPM into your container security strategy</a>.  Take control of your Kubernetes security today.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-a-practitioners-guide-to-kspm/&quot;,&quot;text&quot;:&quot;Read the Blog&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-a-practitioners-guide-to-kspm/"><span>Read the Blog</span></a></p><div><hr></div></blockquote><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.hitchpartners.com/ciso-security-leadership-survey-results-25">Hitch Partners 2025 Security Organization Compensation, Responsibilities, and Structure Survey Results </a></h3><p>If you're like me, you're always looking for insights into CISO and security leader compensation, responsibility trends, and reporting structure insights.<br><br>That's why this recent survey from <strong><a href="https://www.linkedin.com/company/hitch-partners/">HITCH PARTNERS</a></strong> is an absolute gem.<br><br>They surveyed 500+ security leaders, exploring compensation, team dynamics, reporting structures, functioned managed, board exposure, and more.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IOT5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IOT5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 424w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 848w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 1272w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IOT5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png" width="1456" height="1224" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1224,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:395891,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IOT5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 424w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 848w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 1272w, https://substackcdn.com/image/fetch/$s_!IOT5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a0b804d-98c1-4242-a6b5-41b87086baad_1768x1486.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some key takeaways:</p><ul><li><p>Public company CISOs trend well ahead of their private counterparts in terms of compensation, benefits, and protections (e.g., D&amp;O and Indemnification)</p></li><li><p>CISOs continue to juggle more functions and responsibilities, often 10+, with private CISOs having broader responsibilities (and usually smaller teams)</p></li><li><p>Speaking of team size, companies with &lt; 250 employees have teams under 10, while companies with &gt; 5000 employees often have teams approaching 100.</p></li><li><p>The larger the company, the less likely the CISO is to report to the CEO. Over 50 % of CISOs report to CTOs/CIOs (which creates a conundrum in my opinion, as they're often pushing back on initiatives of their senior leadership).</p></li><li><p>The average tenure of security leaders is up to 39 months, likely tied to broader economic disruption and instability.</p></li><li><p>One of the most significant justifications for the budget? </p><p></p><p><strong>Compliance</strong><br><br>As I've been saying, it's almost as if security is biting the hand that feeds it when they go around chanting, "Compliance isn't security!"<br><br>The report has many more insights, so be sure to check it out. It's helpful from multiple perspectives for fellow security leaders, organizations, vendors, and benchmarking.</p></li></ul><h3><a href="https://www.linkedin.com/pulse/verizons-dbir-vs-cyentias-iris-rick-howard-vrupe/?trackingId=5fJbQSZePsW7zueFslVdOA%3D%3D">Verizon&#8217;s DBIR vs. Cyentia&#8217;s IRIS</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pZhr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pZhr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 424w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 848w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pZhr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png" width="358" height="322.5863309352518" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1002,&quot;width&quot;:1112,&quot;resizeWidth&quot;:358,&quot;bytes&quot;:2238221,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pZhr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 424w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 848w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 1272w, https://substackcdn.com/image/fetch/$s_!pZhr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3d8de9-fe05-4bbc-b4ea-13cfbf7e0412_1112x1002.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I have written articles discussing Verizon&#8217;s DBIR findings this year and last, and recently did a deep dive on Cyentia IRIS with Cyentia&#8217;s CEO, Wade Baker. Industry leader and author Rick Howard recently authored a LinkedIn article comparing the two. </p><p>He points out that DBIR isn&#8217;t that useful and is more news than intelligence, while IRIS has some news but is more of an intelligence report, and something you can use to make actionable decisions. I agree with him. </p><p>His primary point is that IRIS better equips you to make specific decisions regarding investments, focus areas, threats, and more. Listen to the discussion I had with Wade Baker below, and you&#8217;ll likely come to the same conclusion.</p><div id="youtube2-SzxyNDqDSvQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;SzxyNDqDSvQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/SzxyNDqDSvQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://www.securityweek.com/maze-banks-25m-to-tackle-cloud-security-with-ai-agents/">Agentic Vulnerability Management Startup Maze Announces $25M Series A</a></h3><p>News recently broke that British cloud security startup Maze announced a $25M Series A, raising a total of $31M since launching nine months ago. They are coming at vulnerability management from an interesting angle, including looking to use swarms of autonomous agents to hunt and fix vulnerabilities. </p><p>They break workloads into concurrent tasks and test every possible attack path looking to hone in on specific vulnerabilities that are exploitable/reachable in cloud environments and pride themselves on being an AI-native security platform.</p><h3><a href="https://www.iansresearch.com/resources/infosec-content-downloads/detail/mid-market-and-SMB-cybersecurity-budget-and-ciso-compensation-2025-report?utm_source=Linkedin&amp;utm_medium=organic_social&amp;utm_campaign=Phil_Linkedin&amp;utm_id=701Ro00000abriAIAQ&amp;utm_content=2025_SMB_MidMarket_Comp_and_Budget">SMB Security Budgets</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q_aM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q_aM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 424w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 848w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 1272w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q_aM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png" width="454" height="491.8333333333333" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1222,&quot;width&quot;:1128,&quot;resizeWidth&quot;:454,&quot;bytes&quot;:796314,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q_aM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 424w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 848w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 1272w, https://substackcdn.com/image/fetch/$s_!q_aM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07cd154a-d49e-4b32-9604-92d5d0750268_1128x1222.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I recently shared IANS report 2025 Compensation and Budget for CISOs in the SMB market. It provided insights into security budgets, compensation for CISOs and security leaders and more. </p><p>One interesting insight was the percentage of security budget in terms of related to IT spend and/or percentage of revenue. Essentially the smaller the organization, the larger the proportion of IT spend and revenue security budgets represent, and then it shrinks as the organizations IT spending and revenues grow. </p><p>This makes sense given larger firms have both larger IT spending and revenue but I was personally surprised to see that security budgets are nearly 20% for SMB&#8217;s under $50m, which shows just how seriously many of them take security threats, at least from a resource allocation perspective.</p><h1>AI</h1><h3><a href="https://simbian.ai/blog/the-first-ai-soc-llm-benchmark">Benchmarking LLMs for Autonomous Alert Triage</a></h3><p>We continue to see the exploration of AI for security use cases, including SOCs and Alert Triage. However, we lack insight into how those models and tools perform for use cases like the SOC. </p><p>AI SOC company Simbian recently attempted to tackle this gap by conducting benchmarking of LLMs for autonomous alert triage.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!edmx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!edmx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 424w, https://substackcdn.com/image/fetch/$s_!edmx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 848w, https://substackcdn.com/image/fetch/$s_!edmx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 1272w, https://substackcdn.com/image/fetch/$s_!edmx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!edmx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png" width="616" height="319.4230769230769" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:755,&quot;width&quot;:1456,&quot;resizeWidth&quot;:616,&quot;bytes&quot;:2073578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!edmx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 424w, https://substackcdn.com/image/fetch/$s_!edmx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 848w, https://substackcdn.com/image/fetch/$s_!edmx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 1272w, https://substackcdn.com/image/fetch/$s_!edmx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1cea403-dd6f-411b-a416-4090a3ab96a7_2412x1250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They cite the existence of benchmarks such as CyberSecEval and CTIBench but state they aren&#8217;t as realistic and don&#8217;t have the depth needed. Simbian conducted a real world test using their Simbian AI SOC agent and an evaluation process grounded in evidence and data. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BG_D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BG_D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 424w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 848w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 1272w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BG_D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png" width="587" height="289.4684065934066" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:718,&quot;width&quot;:1456,&quot;resizeWidth&quot;:587,&quot;bytes&quot;:496379,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BG_D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 424w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 848w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 1272w, https://substackcdn.com/image/fetch/$s_!BG_D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624c82c2-7f05-4d54-aedb-1e53f54255c8_2380x1174.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As shown above, they used popular models from Anthropic, OpenAI, Google, and DeepSeek. They saw models completing over half of the investigation tasks, with results ranging from 61% to 67%. They did stress the importance of thorough prompt engineering and agentic flow engineering to be effective. Initial tests saw lower results, leading to the need to improve prompts. </p><h3><strong><a href="https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/">The Lethal Trifecta for AI Agents</a></strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0uDr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0uDr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 424w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 848w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 1272w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0uDr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png" width="584" height="308.84615384615387" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:770,&quot;width&quot;:1456,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:634393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0uDr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 424w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 848w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 1272w, https://substackcdn.com/image/fetch/$s_!0uDr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F379c80f0-75fc-40d0-ae69-cae3204eba09_1676x886.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We see a lot of excitement about Agentic AI, Agents, and their potential use cases across countless industries and environments.<br><br>That said, they also introduce some significant risks and potential vulnerabilities, primarily through access to private data, the ability to communicate externally, and exposure to untrusted content, as <strong><a href="https://www.linkedin.com/in/simonwillison/">Simon Willison</a></strong> expertly lays out in this article.<br><br>Simon discusses the inherent problem with LLMs is that they follow instructions in content, for better or worse. Due to this behavior, it is easy to be exposed to risks, especially when introducing things such as MCP, agents, and semi- or fully autonomous workflows.<br><br>Excellent article by someone I've been learning a lot from when it comes to AI security lately.</p><h3><a href="https://arxiv.org/pdf/2506.14682">AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in LLMs</a></h3><p>Speaking of benchmarks, another area of cyber being explored with AI is that of AI red teaming, or more broadly, AI models' abilities to autonomously discover and exploit vulnerabilities, including in AI/ML systems themselves. </p><p>Ads Dawson and other researchers from Dreadnode recently shared the Arxiv paper that introduces their &#8220;AIRTBench&#8221; which focuses on measuring autonomous AI red team capabilities in LLMs. </p><p>They conducted 70 realistic CTF challenges that involved the models writing Python code and interacting with and compromising AI systems. The findings are interesting, as they mention Claude-3.7-Sonnet was the clear leader, solving 43 challenges (61% of the total suite, with a 46.9% overall success rate), followed by Gemini-2.5-Pro, GPT-4.5-Preview, and DeekSeek R1. </p><p>They found frontier models were <em><strong>far outpacing open source alternatives</strong></em>, with the best open source model being Llama-4-17B, which only solved seven challenges. The researchers concluded that compared to human researchers, LLMs could solve challenges with remarkable efficiency, doing in minutes what takes humans days or weeks, further validating the promise of LLMs for red teaming and security use cases.</p><h3><a href="https://hackerone.com/leaderboard/country?year=2025&amp;quarter=2&amp;owasp=a1&amp;country=US&amp;assetType=WEB_APP&amp;tab=bbp">xbow Tops HackOne Leaderboard</a></h3><p>Speaking of AI&#8217;s ability to identify and exploit vulnerabilities autonomously, news broke recently that xbow, an AI-native startup that aims to boost offensive security (OffSec) with AI, took over the top spot on the HackerOne leaderboard.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J6CC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J6CC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 424w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 848w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 1272w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J6CC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png" width="561" height="287.0501373626374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:745,&quot;width&quot;:1456,&quot;resizeWidth&quot;:561,&quot;bytes&quot;:410097,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J6CC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 424w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 848w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 1272w, https://substackcdn.com/image/fetch/$s_!J6CC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F550d68d4-f308-42d7-a266-b260c934c2fa_3078x1574.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This seems to be further real-world validation of the effectiveness of AI in optimizing OffSec and vulnerability identification and exploitation. That said, some have pointed out that these tools are great at finding known vulnerabilities and simple bugs fast, while others emphasize that humans will still have a role to play, especially for complex bugs involving business logic and nuance. </p><h3><a href="https://noma.security/blog/enterprise-ai-discovery-requires-complete-coverage-and-deep-context/">AI Discovery Orientation</a></h3><p>Much like other areas of cybersecurity, visibility is key, and why controls such as hardware/software asset inventory are critical. We hear that when it comes to AI security too, with discussions related to AI discovery and inventory, but what does that actually entail?</p><p>This recent blog from Noma Security discusses both how AI discovery if the foundation of AI security and the importance of demanding breadth and depth for a useful AI inventory. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xZSR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xZSR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 424w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 848w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 1272w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xZSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png" width="566" height="417.8914835164835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1075,&quot;width&quot;:1456,&quot;resizeWidth&quot;:566,&quot;bytes&quot;:653080,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xZSR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 424w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 848w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 1272w, https://substackcdn.com/image/fetch/$s_!xZSR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eaf780b-cd84-4be4-949a-6ce5702e2be4_2048x1512.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They emphasize that breadth means complete coverage across the five critical surface areas including:</p><ul><li><p>AI platforms</p></li><li><p>Cloud AI Services</p></li><li><p>Source Code</p></li><li><p>Self-Managed MLOps</p></li><li><p>Third-Party Agents</p></li></ul><p>Depth on the other hand focuses on deep context to lead to actions, and involves insights for AI components such as:</p><ul><li><p>Model lineage and data relationships</p></li><li><p>Agent capabilities</p></li><li><p>AI risk context</p></li><li><p>Insights that facilitate action</p></li></ul><h3><a href="https://www.cybersec-automation.com/p/will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops-c12d22215aa28244">Decoding the Building Blocks: MCP, A2A, and AG-UI </a></h3><p>We continue to hear a lot of hype about Agentic AI, this includes for cyber use cases such as AppSec, GRC, and SecOps among others. Many innovative startups and existing industry leaders are working towards disrupting the SOC through AI and Agents.<br><br>We&#8217;ve also seen the rise of scaffolding to truly empower organizations to take advantage of LLM&#8217;s and Agents via protocols such as MCP and A2A<br><br><strong><a href="https://www.linkedin.com/in/filipstojkovski/">Filip Stojkovski</a></strong> breaks it all down in this great article, along with the need for an Agentic UI (AG-UI) to enable human/agent collaboration.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zi9I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zi9I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 424w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 848w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 1272w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zi9I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif" width="270" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1920,&quot;width&quot;:1080,&quot;resizeWidth&quot;:270,&quot;bytes&quot;:645597,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zi9I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 424w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 848w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 1272w, https://substackcdn.com/image/fetch/$s_!zi9I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dc01237-3c73-4cf2-84d9-54bc6d8a244f_1080x1920.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AppSec, Vulnerability Management and Software Supply Chain</h1><h3><a href="https://a16z.com/next-gen-pentesting-ai-empowers-the-good-guys/">Next-Gen Pentesting: AI Empowers the Good Guys</a></h3><p>We've seen a lot of excitement around AI, both the need to secure it and its ability to help with security use cases. <br><br>One of the leading examples involves Offensive Security (OffSec), or Pen Testing in particular. This is a good piece from <strong><a href="https://www.linkedin.com/company/a16z/">Andreessen Horowitz</a></strong> discussing how AI can empower defenders via penetration testing.<br><br>It covers:</p><ul><li><p>Background on Pen Testing</p></li><li><p>Why traditional Pen Testing is no longer enough</p></li><li><p>Rewriting the Pen Testing playbook</p></li><li><p>Limitations and Challenges</p></li></ul><p>The article covers some of the traditional categories of Pentesting tools, with some examples (notice the emphasis on open source). It also discusses the typical pentesting phases from reconnaissance through reporting.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FYgP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FYgP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 424w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 848w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 1272w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FYgP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png" width="542" height="265.78846153846155" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:1456,&quot;resizeWidth&quot;:542,&quot;bytes&quot;:193818,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FYgP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 424w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 848w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 1272w, https://substackcdn.com/image/fetch/$s_!FYgP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0f171b4-e3b3-4b06-951b-98055fa7f6fe_1546x758.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zN85!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zN85!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 424w, https://substackcdn.com/image/fetch/$s_!zN85!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 848w, https://substackcdn.com/image/fetch/$s_!zN85!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 1272w, https://substackcdn.com/image/fetch/$s_!zN85!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zN85!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png" width="543" height="217.7967032967033" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:584,&quot;width&quot;:1456,&quot;resizeWidth&quot;:543,&quot;bytes&quot;:161709,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zN85!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 424w, https://substackcdn.com/image/fetch/$s_!zN85!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 848w, https://substackcdn.com/image/fetch/$s_!zN85!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 1272w, https://substackcdn.com/image/fetch/$s_!zN85!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f98d22c-5a0d-4c39-bf90-c13b4f13d933_1480x594.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>It discusses why traditional pentesting is no longer enough, due to factors such as mounting unpatched vulnerability backlogs, growing numbers of CVEs, and complexities in modern environments due to Cloud, DevOps, and SaaS. I particularly liked the below quote from Max Moroz as it summarizes not just pentesting but the current state of compliance in Cyber too, which is a snapshot-in-time model with cyclical reviews and assessments, when the threat is constantly changing as well as the underlying environments being assessed. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Js0G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Js0G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 424w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 848w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 1272w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Js0G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png" width="503" height="184.82486263736263" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:535,&quot;width&quot;:1456,&quot;resizeWidth&quot;:503,&quot;bytes&quot;:80046,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Js0G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 424w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 848w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 1272w, https://substackcdn.com/image/fetch/$s_!Js0G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50a89754-de9b-4f7e-80b6-43e51b7b9b25_1460x536.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The article makes the case that pentesting of the future will shift from labor-constrained engagements to scalable AI-native systems able to match the pace of modern development through the combination of LLMs, traditional exploit tooling, real-time telemetry, and proprietary data (which is the actual moat in my opinion). </p><p>The overarching theme is a model that isn&#8217;t constrained by expertise, labor, and expenses but software-first, continuous, and AI-augmented systems. They call out some of these in a market map.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J6Wq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J6Wq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 424w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 848w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 1272w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J6Wq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png" width="1456" height="588" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:588,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:139761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J6Wq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 424w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 848w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 1272w, https://substackcdn.com/image/fetch/$s_!J6Wq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcefe776-3ae6-4f3c-a350-1c6df38944ee_1486x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The article goes on to argue that AI will rewrite the pentest playbook as it thinks like a hacker, trained on real-world exploits, codebases and system behavior to identify flaws in business logic, will shorten testing cycles as it can be run continuously, aren&#8217;t constrained to legacy scopes due to human staffing and will focus on verifiable exploits as opposed to noise.</p><p>While much of this remains to be seen, I certainly think AI will disrupt pentesting much like it will the broader cyber ecosystem as we lean into this technology to take advantage of it much like attackers already are.</p><p>The piece does discuss limitations such as constrained depth and context that some human expertise may bring where AI tooling is still evolving, as well as problems around accountability. </p><p>Shout out to folks such as <strong><a href="https://www.linkedin.com/in/jhaddix/">Jason Haddix</a></strong>, who's also cited.</p><h3><a href="https://aws-samples.github.io/threat-technique-catalog-for-aws/">Threat Technique Catalog for AWS</a></h3><p>AWS remains one of the most dominant CSPs in the world, where organizations store and run critical and sensitive workloads. This Threat Technique Catalog for AWS describes techniques used by threat actors to take advantage of security misconfigurations or compromised credentials on the customer side of the shared responsibility model. It&#8217;s also based on MITRE ATT&amp;CK.</p><p>They map to AWS CloudTrail Event Names when malicious actions are logged in CloudTrail and can be used to assist during incident response and investigations. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fjAm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fjAm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 424w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 848w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 1272w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fjAm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png" width="1456" height="821" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:821,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:505870,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fjAm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 424w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 848w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 1272w, https://substackcdn.com/image/fetch/$s_!fjAm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ffc50ed-cc73-4f99-9106-5c17d9b154a6_2912x1642.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Users can navigate through the various phases and lifecycle of attacks and dig into the specific techniques, such as &#8220;Account Manipulation,&#8221; and see the technique&#8217;s ID, how it can be detected, and how it can be mitigated.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S4Rl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S4Rl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 424w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 848w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S4Rl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png" width="630" height="337.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:780,&quot;width&quot;:1456,&quot;resizeWidth&quot;:630,&quot;bytes&quot;:260963,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S4Rl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 424w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 848w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 1272w, https://substackcdn.com/image/fetch/$s_!S4Rl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4aab69e5-6b43-44c5-9859-73ce97fcce0c_2244x1202.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://shostack.org/blog/publish-your-threat-model">Publish Your Threat Model?</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MpPd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MpPd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 424w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 848w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 1272w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MpPd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png" width="502" height="221.6936813186813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:643,&quot;width&quot;:1456,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:1254074,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MpPd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 424w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 848w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 1272w, https://substackcdn.com/image/fetch/$s_!MpPd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c65141-081f-4f18-afb0-5c72db2066e3_2290x1012.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>To many, publishing threat models, risk assessments, and other potentially sensitive artifacts that may be useful to attackers seems like blasphemy.</p><p>However, Adam Shostack of Threat Modeling fame makes the case that it is exactly what we should be doing. In addition to an essay arguing for the practice, Adam points to emerging compliance requirements, particularly from the compliance juggernaut, the EU, that may require it. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XIIW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XIIW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 424w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 848w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 1272w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XIIW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png" width="617" height="450.0370879120879" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1062,&quot;width&quot;:1456,&quot;resizeWidth&quot;:617,&quot;bytes&quot;:549072,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XIIW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 424w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 848w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 1272w, https://substackcdn.com/image/fetch/$s_!XIIW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc564e26a-4ae6-4515-98b1-fb837c94ae58_2070x1510.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.detectionatscale.com/p/the-cursor-moment-for-security-operations">The Cursor Moment for SecOps: How MCP and AI Coding Agents are Enabling the Next Evolution of Detection Engineering</a></h3><p><span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Jack Naglieri&quot;,&quot;id&quot;:85379436,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4424d74c-16df-4a59-95b3-c650104799e9_1239x1239.jpeg&quot;,&quot;uuid&quot;:&quot;7c7d2e45-b5c2-415e-a382-88eca8ff4d95&quot;}" data-component-name="MentionToDOM"></span> continues to post thought-provoking content about the role of AI, Agents, and MCP and its implications for the future of SecOps.</p><p>His latest piece is no exception. He discusses the current state of manual detection engineering and the traditional detection engineering process, including how cumbersome and time-consuming they are. </p><p>He discusses how a significant paradigm shift can occur by connecting your SIEM with leading AI tools via MCP such as Cursor, Claude, Goose, or others and asking questions about unusual patterns, insights into logs, user behavior, and more. The days of manually combing through logs and system data are quickly moving behind us as we pivot to using natural language and AI to gain insights that weren&#8217;t impossible without massive human capital.</p><p>Jack walks through a practical example of having AI analyze CloudTrail logs and product reports related to activities impacting service roles, access attempts, changing IAM permissions and other potentially concerning activities. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZndQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZndQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 424w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 848w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 1272w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZndQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png" width="380" height="359.64285714285717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1378,&quot;width&quot;:1456,&quot;resizeWidth&quot;:380,&quot;bytes&quot;:1493252,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZndQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 424w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 848w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 1272w, https://substackcdn.com/image/fetch/$s_!ZndQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48ff9342-8294-40bd-9f37-a97580b51a64_1800x1704.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Jack discusses how MCP can function as a glue, connecting various platforms and tools within the same AI session, such as your SIEM, ticketing system, on-call rotation tooling, Slack channels, and more, into a single thread to ensure we move from signal to outcomes in the security context of mitigating organizational risks. </p><p>Ironically, MCP and AI create the ever-elusive &#8220;single pane of glass&#8221;, weaving together insights across tools and platforms, minimizing the need for context switching and overload for security practitioners and analysts. </p><p>Jack discusses the time savings and multiplier effects of the new AI-augmented workflow for detection engineering, offering strategic and tactical improvements to the practice.</p><h3><a href="https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html">This Is How They Tell Me Bug Bounty Ends</a></h3><p>We continue to see the rapid exploration of the art of the possible when it comes to AI, including cybersecurity use cases such as Offensive Security/Pen Testing, as I discussed above. We&#8217;ve seen promising startups such as Xbow and Ethiac demonstrate the power of automated, autonomous, AI-powered pen testing. </p><p>That said, as Joseph Thacker lays out in this thought-provoking piece, the disruption to bug bounty and offensive security more broadly is likely to happen gradually rather than immediately. He discusses how these emerging tools and companies are able to find 1% of vulnerabilities on live production applications, typically simple single-step verifiable bugs, but that will grow in time to larger percentages and more complex bugs and flaws.</p><p>However, that doesn&#8217;t mean bug bounty will go away, even if some leverage these tools to capture bounties and scale their findings. Joseph makes the case that there will always be a need for hackers, the creative, innovative types who grind, find nuanced problems and flaws, refuse to give up, and even leverage these tools to be more effective than they ever were. </p><h3><a href="https://edera.dev/stories/demystifying-confidential-computing">Demystifying Confidential Computing</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Az_6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Az_6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 424w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 848w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 1272w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Az_6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png" width="562" height="174.46703296703296" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5b412b1-726f-438e-b895-b6a511685a13_1624x504.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:452,&quot;width&quot;:1456,&quot;resizeWidth&quot;:562,&quot;bytes&quot;:167642,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165287920?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Az_6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 424w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 848w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 1272w, https://substackcdn.com/image/fetch/$s_!Az_6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5b412b1-726f-438e-b895-b6a511685a13_1624x504.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>There&#8217;s been a lot of hype and buzz around the topic of confidential computing lately, but what exactly is it? This is a great primer from Edera, who focuson making secure computing simple and secure, with a focus on Kubernetes, multi-tenancy and AI. </p><p>As they put it, it involves encryption for data &#8220;in use&#8221;, to coincide with encryption of data at-rest and in-transit, providing full lifecycle coverage of data confidentiality regardless of the state of the data. Edera states confidential computing is projected to reach a TAM of $350M by 2032. Edera emphasizes that confidential computing means that other apps, the host OS, hypervisor, system admins and even those with physical access cannot view or tamper with a running program under a confidential computing implementation. </p><p>Edera states that confidential computing is primarily achieved through hard-ware based attested Trusted Execution Environments (TEE)&#8217;s, involving hardware next to the CPU that performs operations on encrypted memory. They show that there are various designs of TEE&#8217;s from different vendors and providers, each with their own considerations and security benefits. The TEE&#8217;s often involve keys generated by the TEE and involved monitoring by privileged hardware, with further isolation conducted via the Kernel and/or User Level. </p><p>The blog goes on to discuss current applications and emerging use cases for confidential computing, including:<br></p><ul><li><p>Confidential AI</p></li><li><p>Multi-party computation</p></li><li><p>Regulatory compliance</p></li></ul><p>They also discuss there are costs to confidential computing, including the hardware as well as potentially higher compute costs and implications of the number of applications that can be run concurrently on a single TEE. These costs continue to decline with modern implementations and innovations as well. </p><p>The blog has much more detail and insight but ultimately a renewed interest in confidential computing is being driven by increased AI adoption, virtualized workloads and regulatory compliance calling for stricter controls on segmentation, confidentiality and integrity of data, including in-use. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #51]]></title><description><![CDATA[Trump Cyber EO, AI Security Report, Small LLMs for Secrets Detection, Congress Calls Out NVD/CVE, CISA&#8217;s &#8220;North Star&#8221; for CVE & AI Vulnerability Scoring System (AIVSS)]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-51</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-51</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 12 Jun 2025 13:25:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!l8-w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to issue #51 of the Resilient Cyber Newsletter.</p><p>It is almost unbelievable that we&#8217;re one issue away from one year of issues, and a year since I kicked this initiative off. I&#8217;m genuinely thankful for the thousands of folks who have joined me on this journey and I look forward to speaking more about that soon!</p><p>This week there is a lot to discuss, including a new Cyber Executive Order (EO) out of The White House, utilizing LLMs for secrets detection, Congress calling out NIST&#8217;s NVD/CVE program and the introduction of an AI Vulnerability Scoring System (AIVSS).</p><p>So, let&#8217;s get into it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l8-w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l8-w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 424w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 848w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 1272w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l8-w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png" width="487" height="350.86744505494505" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1049,&quot;width&quot;:1456,&quot;resizeWidth&quot;:487,&quot;bytes&quot;:2356478,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l8-w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 424w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 848w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 1272w, https://substackcdn.com/image/fetch/$s_!l8-w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28da6057-0806-43a8-93c9-0aa19a1b4c41_1516x1092.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/">Trump Admin Publishes New Cyber EO</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2bIS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2bIS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 424w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 848w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 1272w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2bIS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png" width="554" height="265.96565934065933" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:699,&quot;width&quot;:1456,&quot;resizeWidth&quot;:554,&quot;bytes&quot;:480346,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2bIS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 424w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 848w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 1272w, https://substackcdn.com/image/fetch/$s_!2bIS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffa41ad1-ec27-4e8e-ab7e-4f5257e22f78_2878x1382.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybersecurity Executive Orders (EO) have played a significant role in cybersecurity discussions over the last several years, most notably due to President Biden&#8217;s 14028. However, the Trump administration recently released a Cyber EO, which revoked some aspects of prior Biden Cyber EOs. </p><p>The two primary areas it target include:</p><ul><li><p>Rescinding Biden EO&#8217;s digital identity development section</p></li><li><p>Rolling back secure software attestations, including SSDF and CISA&#8217;s self-attestation repository</p></li></ul><p>The EO also emphasizes using AI to tackle vulnerabilities and setting definitive post-quantum deadlines.</p><h3><a href="https://www.businesswire.com/news/home/20250610254822/en/Horizon3.ai-Raises-%24100M-to-Cement-Leadership-in-Autonomous-Security?fbclid=IwY2xjawK1BZRleHRuA2FlbQIxMQBicmlkETFoblVLZDVhQWlzUjdUUUpGAR7yaVHHnt-5ovhH67Px9U-wqr1LOZgn4mN8jK7EW_mCz72gIhQmSA8s1gC8QA_aem_O_efGkZX7xnjI7G7kmex5A">Horizon3.ai Raises $100M to Cement Leadership in Autonomous Security</a></h3><p>Horizon3.ai, an offensive and autonomous security leader, has recently announced its $100M Series D funding round. In the announcement, they touted their NodeZero capability and over 3,000 customer organizations using it, leading to a sustained 100% YoY ARR growth and being Rule of 40 positive. </p><p>I interviewed the founder of Horizon3.ai, Snehal Antani, in an episode titled &#8220;Building and Scaling a Security Startup&#8221; a while back, which you can catch below:</p><div id="youtube2-2BUQD6DF4Ns" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2BUQD6DF4Ns&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2BUQD6DF4Ns?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Horizon3.ai states they&#8217;re targeting an $80B TAM in autonomous security, due to the generational shift that AI is driving where human labor can be replaced with AI and agentic capabilities. </p><p>Their plans for the use of funding include scaling through partners, product innovation and pursuing the Federal market, building on their success in the DIB, NSA and other pockets of the Federal market already.</p><h3><a href="https://www.calcalistech.com/ctechnews/article/skwehyumgx">a16z Targets Elite IDF Alumni for Startup Accelerator</a></h3><p>You&#8217;ve inevitably seem me speak about the outsized role Israel plays in the startup and cybersecurity ecosystem at large. This is a trend many others are deeply familiar with as well, including the silicon valley venture giant Andreessen Horowitz, who its been reported is targeting Israel&#8217;s IDF alumni for startup acceleration.</p><p>a16z, which manages roughly $45 <em><strong>billion</strong></em> is looking to expand their Israe li market and have been hosting events and what they have called a&nbsp;16z &#8220;speedrun program&#8221; where they try and lure Israeli talent to their organization rather than competing funds such as Sequoia and Greylock. It&#8217;s aimed at Seed and pre-Seed stage startups and provides up to $1 million per company along with mentorship and network access.  </p><h3><a href="https://ventureinsecurity.net/p/security-is-not-the-department-of">Security is not the department of &#8220;No&#8221;; it&#8217;s the department that gets told &#8220;No&#8221;</a></h3><p>We often hear the tired quote that &#8220;security is the office of no&#8221;, this is perpetuated due to the fact that security tends to be risk adverse and shut everything down. Most practitioners know the folly of this approach and that this just leads to rampant shadow risks and a lack of engagement from peers as they do things anyways and just avoid us, or telling us about whatever it is.</p><p>In this hard hitting piece from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Ross Haleliuk&quot;,&quot;id&quot;:2607604,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8fa0e73b-27de-49eb-a585-393f1add9ab8_1500x1000.jpeg&quot;,&quot;uuid&quot;:&quot;e5b86804-d76a-4f0b-bcf2-e2f67f8853dc&quot;}" data-component-name="MentionToDOM"></span> at Venture in Security, he points out how security isn&#8217;t the office of no, but instead is the department that gets told no, which is true, even if it bruises some egos.</p><p>As Ross points out, sure, security gets to say no to things, but it is generally on the outskirts and obscure technical decisions related to SSH access, browser extensions, MFA and so on. When it comes to actual business impacting decisions such as product launches, feature releases or partner integrations, security often has little say, and if they do, they generally get overridden by the business, because security typically doesn&#8217;t get to shut down revenue related activities. </p><p>Ross&#8217; take in the article reminds me of my own article &#8220;<strong><a href="https://www.resilientcyber.io/p/cybersecuritys-delusion-problem">Cybersecurity&#8217;s Delusion Problem: A discussion about cybersecurity&#8217;s inability to accept the world (business) doesn&#8217;t revolve around them</a></strong>&#8221; where I made similar points.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w-P9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w-P9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 424w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 848w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 1272w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w-P9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png" width="314" height="306.76080691642653" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:678,&quot;width&quot;:694,&quot;resizeWidth&quot;:314,&quot;bytes&quot;:1044345,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w-P9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 424w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 848w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 1272w, https://substackcdn.com/image/fetch/$s_!w-P9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F33dec212-15d9-45af-b68f-0293c1703ccb_694x678.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://fortune.com/2025/06/11/microsoft-copilot-vulnerability-ai-agents-echoleak-hacking">MSFT Copilot Flaw &#8220;EchoLeak&#8221; Signals Broader Risk of AI Agents Being Hacked</a> </h3><p>AI security startup AIM Security identified a &#8220;zero-click&#8221; attack on an AI agent. The attack can be triggered by simply sending an email to a user and a combination of clever techniques that turns the AI assistant against itself. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b2vP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b2vP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 424w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 848w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 1272w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b2vP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png" width="545" height="202.12912087912088" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a613d950-1323-4846-8933-620582bfb30a_3220x1194.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:1456,&quot;resizeWidth&quot;:545,&quot;bytes&quot;:2220902,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b2vP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 424w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 848w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 1272w, https://substackcdn.com/image/fetch/$s_!b2vP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa613d950-1323-4846-8933-620582bfb30a_3220x1194.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>It preys on the fundamental way Copilot works, and involves the attacker sending an innocent-seeming email with hidden instructions for Copilot, and since Copilot scans user&#8217;s emails, it inadvertently follows an embedded prompt to dig into files and pull out sensitive data. </p><p>Aim points out similar agent-based capabilities from other vendors may have a similar vulnerability and given it is a fundamental design flaw with the technologies, is very likely to be happening in other places.</p><p>They call it an &#8220;LLM scope violation vulnerability&#8221;, where a model is tricked into accessing or exposing data beyond what it&#8217;s authorized or intended for. Challenges involve right-sizing permissions and the unpredictable nature of AI.</p><p>This is something many have raised before, being tied to content and prompts and AI struggling to distinguish between instructions and data.</p><h1>AI</h1><h1><a href="https://pulse.latio.tech/p/2025-latio-ai-security-report">2025 Latio AI Security Report</a></h1><p>If you&#8217;re like me, you are likely often looking for quality reports that aren&#8217;t filled with vendor fluff and hype and truly cut through noise to help you understand the various vendors, technical considerations and problems within security.</p><p>This latest AI Security Report from my friend James Berthoty of Latio Tech does just that, covering the top AI risk types:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jvKL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jvKL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 424w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 848w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 1272w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jvKL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png" width="384" height="329.9340659340659" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1251,&quot;width&quot;:1456,&quot;resizeWidth&quot;:384,&quot;bytes&quot;:215156,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jvKL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 424w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 848w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 1272w, https://substackcdn.com/image/fetch/$s_!jvKL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb85e941-88d8-43a8-a16d-12bd9e5a5137_1464x1258.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It also provides a market map of leaders across various product categories such as End User Data Control, AI Posture, AI for Security and AI Application Protection. It discusses the key problems related to AI security and the innovators making an impact. This was a highly informative and well put together report, as someone who shares a lot of <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;James Berthoty&quot;,&quot;id&quot;:215222117,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029c069a-0ea1-4c28-bedb-742a03fa770a_800x800.jpeg&quot;,&quot;uuid&quot;:&quot;9fb6161c-8b24-491b-b859-1022f19c42b4&quot;}" data-component-name="MentionToDOM"></span>&#8217;s content, I can say this is some of the best stuff he has produced so far.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TftZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TftZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 424w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 848w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 1272w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TftZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png" width="342" height="393.6341030195382" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1296,&quot;width&quot;:1126,&quot;resizeWidth&quot;:342,&quot;bytes&quot;:361395,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TftZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 424w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 848w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 1272w, https://substackcdn.com/image/fetch/$s_!TftZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd50015d6-434c-462e-80e1-0dc7fc6bc254_1126x1296.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong><a href="https://blog.stackaware.com/p/model-context-protocol-mcp-prompt-injection-line-jumping-ai-agents">Model Context Protocol (MCP): </a></strong><a href="https://blog.stackaware.com/p/model-context-protocol-mcp-prompt-injection-line-jumping-ai-agents">The Good, the Bad, and the Ugly of AI&#8217;s interface to the real world</a></h3><p>The Model Context Protocol (MCP) continues to dominate discussions around AI, specifically for its potential to enable agentic workflows and extend the capability of many existing tools and services. </p><p>This post on Stackaware from Daniel Kalinowski discusses MCP, including the good AND the bad. It frames MCP as a natural language for DevOps, facilitating improved security efficiency. It also discusses challenges such as a lack of fine-grained permissions and access control, opaque auditing, and supply chain risks. </p><p>Given that MCP is in its infancy, we will continue to see organizations encounter the good, the bad, and the ugly as they explore how MCP can power the modern agentic enterprise. </p><h3><a href="https://simonwillison.net/2025/Jun/6/six-months-in-llms/">The last six months in LLM&#8217;s, illustrated by pelicans on bicycles</a></h3><p>It can be incredibly tough to keep up with the rate of developments in the AI and LLM space, even for the best of us. Industry AI leader Simon Willison recently gave a keynote at the AI Engineer World Fair and covered the last six months in LLMs in a great talk.</p><p>He covers key developments, capabilities across models and much more. </p><div id="youtube2-z4zXicOAF28" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;z4zXicOAF28&quot;,&quot;startTime&quot;:&quot;5295s&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/z4zXicOAF28?start=5295s&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://securetrajectories.substack.com/p/security-takeaways-from-2025-ai-engineer">Security Takeaways from 2025 AI Engineer World&#8217;s Fair</a></h3><p>Speaking of the AI Engineer World Fair, Matt Maisel put together a great article discussing the security-specific takeaways from the event.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Rn1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Rn1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 424w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 848w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 1272w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Rn1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png" width="198" height="297.87301587301585" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78279918-2915-41b8-b781-067182e218e4_1134x1706.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1706,&quot;width&quot;:1134,&quot;resizeWidth&quot;:198,&quot;bytes&quot;:3504853,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8Rn1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 424w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 848w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 1272w, https://substackcdn.com/image/fetch/$s_!8Rn1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78279918-2915-41b8-b781-067182e218e4_1134x1706.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It shouldn&#8217;t be a surprise that one of the primary takeaways is 2025 is being positioned as the year of agents. This is something I discussed extensively in an article titled &#8220;<strong><a href="https://www.resilientcyber.io/p/agentic-ais-intersection-with-cybersecurity">Agentic AI&#8217;s Intersection with Cybersecurity: Looking at one of the hottest trends in 2024-2025 and its potential implications for cybersecurity</a></strong>&#8221;.</p><p>The key takeaways Matt highlights include:</p><ul><li><p>Anatomy of an AI breach</p></li><li><p>The system-level control imperative</p></li><li><p>The promise and limits of private compute</p></li><li><p>When standard AI evaluations fail</p></li><li><p>Solving the agent identity crisis</p></li><li><p>Containing the software-building agent</p></li><li><p>A new framework for agent reasoning</p></li></ul><p>As you can tell, and Matt points out, the key themes involve moving beyond the LLMs and into the broader architecture and workflows agents will be involved in. </p><h3><a href="https://www.wiz.io/blog/small-language-model-for-secrets-detection-in-code">Lean and Mean: How We Fine-Tuned a Small LLM for Secret Detection in Code</a></h3><p>There&#8217;s a lot of focus on frontier models and the industry leading mega models, but many are experimenting with smaller models as well. This piece from Wiz looks at how they fine-tuned a small LLM (Llama 3.2 1B) to be used for detecting secrets in code, reaching an 86% precision and 82% recall, which outperformed traditional regex-based methods for secrets detection, a painful false positive problem many are familiar with when it comes to existing tools.</p><p>The Wiz research also highlights challenges such as secrets being stored in repositories (and potentially exposed).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yK5O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yK5O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 424w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 848w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 1272w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yK5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png" width="1456" height="468" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:468,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:493684,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yK5O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 424w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 848w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 1272w, https://substackcdn.com/image/fetch/$s_!yK5O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa491e2c5-12d0-4da6-b99d-d99f8fa62ac5_1712x550.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Wiz blog goes on to discuss how they handled training the model, testing results, moving into production and more. It is really promising to see LLMs applied to cybersecurity use cases in the real-world and the potential use cases expand well beyond secrets detection.</p><h1>AppSec, Vulnerability Management and Software Supply Chain</h1><h3><a href="https://www.linkedin.com/posts/patrickmgarrity_cve-nist-nvd-activity-7338712006767595520-qEW0?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Congress Sends Letter to NIST about NVD/CVE Performance and Effectiveness</a></h3><p>I shared recently how the Government Accountability Office (GAO) had sent an inquiry to NIST about the efficiency and effectiveness of NVD and CVE. Now, a letter from Congress themselves has been sent to the GAO regarding NIST, NVD and CVE. </p><p>The letter lays out the initial importance of NVD/CVE&#8217;s, as well as recounting some of the programs struggles starting in 2024 with funding issues, backlogs of unenriched CVE&#8217;s and more. </p><p>It asks that GAO assess the efficiency and effectiveness of:</p><ul><li><p>NIST programs that support the creation and publication of standards-based vulnerability management data, including the NVD</p></li><li><p>The CVE program, including DHS&#8217;s role in supporting CVE</p></li><li><p>The degree to which the government and non-government entities rely on the NVD and CVE</p></li></ul><h3><a href="https://youtu.be/X58iSkPJnUk?si=yLGjUcJMHH0FhqA5">CISA&#8217;s North Star Vision for the CVE Program</a></h3><p>Speaking of the CVE program and DHS (CISA)&#8217;s involvement in the program, as part of VulnCon 2025, CISA spoke at the event, laying out their &#8220;North Star Vision&#8221; for the CVE program. The talk stresses the importance of the CVE database, the uptick in CVE records and the challenges that brings as well as CISA&#8217;s goals for CVE such as:</p><ul><li><p>Intentional Scaling and Federation</p></li><li><p>Raising the Data Enrichment Bar</p></li><li><p>Improving Quality</p></li></ul><p>This is a really informative talk, not only discussing the CVE program but broader industry trends around vulnerability management.</p><div id="youtube2-X58iSkPJnUk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;X58iSkPJnUk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/X58iSkPJnUk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://aivss.owasp.org/">AI Vulnerability Scoring System (AIVSS)</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x9YU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x9YU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 424w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 848w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 1272w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x9YU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png" width="1456" height="289" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:289,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:257343,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!x9YU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 424w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 848w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 1272w, https://substackcdn.com/image/fetch/$s_!x9YU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff7648bdb-d77f-4f22-8e90-a0a541f55ee6_1802x358.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Incredibly excited to be among the Founding Members for the <strong><a href="https://www.linkedin.com/company/owasp/">OWASP&#174; Foundation</a></strong> AIVSS. It's clear that AI introduces challenges, such as prompt injection attacks, its non-deterministic nature, lifecycle vulnerabilities, and even ethical impacts. <br><br>Agentic AI further challenges this in terms of autonomy, dynamic identity, multi-agent systems, tool use, and adaptability. Traditional vulnerability systems and scoring methodologies aren't well-suited for AI, particularly Agentic AI. <br><br>Existing scoring systems can be leveraged with AI-specific metrics and environmental factors to help prioritize AI vulnerabilities, but work must be done to get there.<br><br>I'll be collaborating with a powerhouse group of folks, such as <strong><a href="https://www.linkedin.com/in/kenhuang8/">Ken Huang, CISSP</a></strong>, <strong><a href="https://www.linkedin.com/in/michaelbargury/">Michael Bargury</a></strong>, <strong><a href="https://www.linkedin.com/in/vineethsai/">Vineeth Sai Narajala</a></strong>, <strong><a href="https://www.linkedin.com/in/rob-joyce-b43445116/">Rob Joyce</a></strong>, <strong><a href="https://www.linkedin.com/in/jason-d-clinton/">Jason Clinton</a></strong>, <strong><a href="https://www.linkedin.com/in/avassilev/">Apostol Vassilev</a></strong>, and a great group of founding members to build out AIVSS for the community.</p><h3><a href="https://appomni.com/ao-labs/salesforce-industry-clouds-security-report-omnistudio-cves/">Salesforce Industry Clouds: 0-days, Insecure Defaults and Exploitable Misconfigurations</a></h3><p>Most know the industry leader Salesforce and the fact that they have a massive customer base and presence in enterprise environments. That&#8217;s why this recent report and research from AppOmni, a SaaS Security vendor was interesting. They identified over 20 security issues in OmniStudio along with five critical CVE&#8217;s in Salesforce. </p><p>The paper covers key topics such as default sharing settings, access control, caching and data leaks and more. </p><h3><a href="https://www.rand.org/pubs/research_reports/RRA3817-1.html">Insuring Catastrophic Cyber Risk</a></h3><p>I&#8217;ve spoken many times about how were living in a software-driven society. Software powers everything from consumer goods to critical infrastructure and touches nearly every aspect of society from in our homes, to national security and geopolitics. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jVlg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jVlg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 424w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 848w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 1272w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jVlg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png" width="366" height="392.18025751072963" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1498,&quot;width&quot;:1398,&quot;resizeWidth&quot;:366,&quot;bytes&quot;:1336061,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165533869?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jVlg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 424w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 848w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 1272w, https://substackcdn.com/image/fetch/$s_!jVlg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6794e489-3c2b-410b-bdbb-dd6e02b3345e_1398x1498.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This recent paper out of RAND looks at an investigation being done by the Department of Treasury about the potential need for a federal response to manage harms from a catastrophic cyber event. They discuss the implications of the nature of cyber risk for the functioning of insurance markets, review trends, and potential gaps in the insurance market and also potential policy options about a public-private risk shartng scheme such as a Federal &#8220;Cyber Risk Insurance Program (CRIP). </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #50]]></title><description><![CDATA[2025 Rising in Cyber List, FedRAMP 20x Updates, Cyber Opportunities & Risks of Agentic AI and AppSec&#8217;s Exploitation Era]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-50</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-50</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 05 Jun 2025 16:16:01 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wyPy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to another issue of the Resilient Cyber Newsletter.</p><p>A good mix of resources this week in terms of cyber market analysis and technical topics, so let&#8217;s get to it.</p><p>I hope you enjoy this week&#8217;s resources!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wyPy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wyPy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 424w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 848w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wyPy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png" width="456" height="331.35164835164835" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1058,&quot;width&quot;:1456,&quot;resizeWidth&quot;:456,&quot;bytes&quot;:2495719,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wyPy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 424w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 848w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!wyPy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5960ff23-8e01-471e-a213-f8e59ae186c5_1566x1138.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9M5c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9M5c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 424w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 848w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 1272w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9M5c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg" width="300" height="68" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:68,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;site logo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="site logo" title="site logo" srcset="https://substackcdn.com/image/fetch/$s_!9M5c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 424w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 848w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 1272w, https://substackcdn.com/image/fetch/$s_!9M5c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fbadda5-ad6d-4cb7-aa37-cf14b4f04905_240x54.svg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Hardening AD? Start with your passwords</h3><p>Not all complex passwords are secure. Specops Password Policy lets you <a href="https://specopssoft.com/product/specops-password-policy/?utm_source=resilientcyber&amp;utm_medium=referral&amp;utm_campaign=resilientcyber_referral&amp;utm_content=newsletter_ad">enforce true security hygiene across your Active Directory</a>, using real-time breached password filtering, granular policy targeting via GPO, and <a href="https://specopssoft.com/product/specops-password-policy/?utm_source=resilientcyber&amp;utm_medium=referral&amp;utm_campaign=resilientcyber_referral&amp;utm_content=newsletter_ad">compliance-ready enforcement for NIST, NCSC, and more</a>.</p><p>Go beyond Microsoft&#8217;s legacy settings with custom dictionaries, passphrase support, and rules that adapt to your environment. No schema extensions. No agent sprawl.</p><p>Just <a href="https://specopssoft.com/product/specops-password-policy/?utm_source=resilientcyber&amp;utm_medium=referral&amp;utm_campaign=resilientcyber_referral&amp;utm_content=newsletter_ad">precise control at scale</a>.</p><p>If you&#8217;re hardening AD, your password policy shouldn&#8217;t be the weakest link.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://specopssoft.com/product/specops-password-policy/?utm_source=resilientcyber&amp;utm_medium=referral&amp;utm_campaign=resilientcyber_referral&amp;utm_content=newsletter_ad&quot;,&quot;text&quot;:&quot;Enforce a real password security&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://specopssoft.com/product/specops-password-policy/?utm_source=resilientcyber&amp;utm_medium=referral&amp;utm_campaign=resilientcyber_referral&amp;utm_content=newsletter_ad"><span>Enforce a real password security</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.risingincyber.com/">Rising in Cyber 2025 List Unveiled</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hGbI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hGbI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 424w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 848w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 1272w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hGbI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png" width="401" height="279.88419405320815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:892,&quot;width&quot;:1278,&quot;resizeWidth&quot;:401,&quot;bytes&quot;:1291180,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hGbI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 424w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 848w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 1272w, https://substackcdn.com/image/fetch/$s_!hGbI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F51a42b0e-7f66-4469-b0ac-6dad21bda42e_1278x892.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Notable Capital recently unveiled their &#8220;Rising in Cyber&#8221; list, highlighting the most promising private cyber companies selected by leading CISOs and security executives and those who have been nominated by top VC firms. </p><p>Companies are categorized as Early Stage (~$35M), Mid Stage ($35M-$100M) or Late Stage ($100M+) raised.</p><p>The publication also discusses the state of the industry and provides some solid insights. This includes the dichotomy of AI, where it is dominating headlines and investments, but also making many concerned from the security angle as well.</p><p>It&#8217;s amazing to see the market cap of publicly traded cyber companies exceed $625 <em><strong>billion</strong></em>, when it was just $116 billion 10 years ago, that&#8217;s a hell of a decade for cybersecurity. </p><p>It also pointed out that 51 of the 75 cybersecurity deals over $200 million since 2022 were done by strategic acquisitions (e.g. existing players) in the ecosystem, showing the push towards consolidation, large players innovating through acquisition versus organic R&amp;D and the overall vitality of the cyber industry as it grows. </p><p>Elastic&#8217;s CISO is even quoted as saying</p><blockquote><p><strong>&#8220;Startups are the R&amp;D labs of the larger security companies&#8221;</strong></p></blockquote><p>The report projects cyber spending to double by 2029, reaching an annual total of $229 <em><strong>billion</strong>. </em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XzWj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XzWj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 424w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 848w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XzWj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png" width="590" height="281.62774725274727" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:695,&quot;width&quot;:1456,&quot;resizeWidth&quot;:590,&quot;bytes&quot;:366711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XzWj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 424w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 848w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 1272w, https://substackcdn.com/image/fetch/$s_!XzWj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7945c2f1-3f87-4c83-b107-04f62c5d3630_2932x1400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Notable&#8217;s report shares several key insights pulling from Morgan Stanley analysis, including that we have a complex need in cyber that&#8217;s leading to a booming market, see below: </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HnGf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HnGf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 424w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 848w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 1272w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HnGf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png" width="1456" height="173" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:173,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130209,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HnGf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 424w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 848w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 1272w, https://substackcdn.com/image/fetch/$s_!HnGf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67ccb77-1f1f-429d-a09f-61a1023cb36d_3138x372.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>They also provided insights into the trends and changes of the Top 10 publicly listed cyber players in terms of market cap over the last decade, and the growth is truly astounding:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!51Ne!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!51Ne!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 424w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 848w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 1272w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!51Ne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png" width="1456" height="776" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:776,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:805674,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!51Ne!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 424w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 848w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 1272w, https://substackcdn.com/image/fetch/$s_!51Ne!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84a4ae61-2703-4f06-ae37-45ccc9617c6b_3126x1666.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>They point out the role of strategic acquirers (e.g. existing companies) being a driving force behind the industry&#8217;s M&amp;A activity, as they look to enhance their offerings, expand their market share, and consolidate competitors. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WCMo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WCMo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 424w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 848w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 1272w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WCMo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png" width="1456" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:574415,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WCMo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 424w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 848w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 1272w, https://substackcdn.com/image/fetch/$s_!WCMo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f91f9b-9e5b-4aa8-a6b6-0892c6f785fa_3100x1806.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A key theme of Notable&#8217;s piece is just how critical cybersecurity is to running modern businesses, to which I agree with completely, because never every business runs on software to some extend and software plays a key role from operations to value delivery to customers. </p><blockquote><p><strong>We live in a software-driven society.</strong></p></blockquote><p>Some of they key survey findings involve budget pressures, the role of AI and agents, and the foundational role that identity plays:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!djzU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!djzU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 424w, https://substackcdn.com/image/fetch/$s_!djzU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 848w, https://substackcdn.com/image/fetch/$s_!djzU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 1272w, https://substackcdn.com/image/fetch/$s_!djzU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!djzU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png" width="1456" height="456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:400450,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!djzU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 424w, https://substackcdn.com/image/fetch/$s_!djzU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 848w, https://substackcdn.com/image/fetch/$s_!djzU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 1272w, https://substackcdn.com/image/fetch/$s_!djzU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88f61e27-fa6f-4928-a5a6-9eaa11336ef1_3042x952.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One key theme throughout the Notable piece is also the potential of AI, from SecOps, to AppSec and GRC, many are looking for this promising technology to help alleviate workload challenges, automate toil, accelerate meantime-to-detection, mitigate vulnerabilities and much more. This is also evident in the massive number of startups that are both focused on AI and Cyber, as well as the premium in terms of valuation and fundraising that AI-native firms are fetching. </p><h3><a href="https://www.fedramp.gov/2025-05-29-fedramp-20x-two-months-in-and-taking-off/">FedRAMP 20x - Two Months In and Taking Off</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tWvQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tWvQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 424w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 848w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 1272w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tWvQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png" width="478" height="248.8489010989011" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:758,&quot;width&quot;:1456,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:381570,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tWvQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 424w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 848w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 1272w, https://substackcdn.com/image/fetch/$s_!tWvQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4d72a68-0dde-464b-970b-01f3eedd3ea4_1974x1028.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you pay any attention to the public sector you likely have noticed the U.S. Federal Government&#8217;s cloud authorization program, FedRAMP, has been undergoing some big changes. </p><p>Some of these include contractual changes in terms of workforce and PMO size etc. but others include efforts to streamline, innovate and modernize the FedRAMP program itself, which has been dubbed as &#8220;FedRAMP 20x&#8221;, and being championed by the programs lead Pete Waterman.</p><p>FedRAMP recently shared an update on being two months in to FedRAMP 20x and some of the key changes. and progress.</p><p>This includes launch FedRAMP 20x Phase One pilots, updating key FedRAMP guidance such as the introduction of Key Security Indicators (KSI)&#8217;s aligned with NIST 800-53, as well as guidance on &#8220;Minimum Assessment Scope&#8221; which looks to narrowly define boundaries for assessment and authorization. </p><h3><a href="https://www.svb.com/trends-insights/reports/state-of-enterprise-software/">State of Enterprise Software 2025 Report</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bdah!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bdah!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 424w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 848w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 1272w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bdah!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png" width="1456" height="313" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:313,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:974056,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bdah!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 424w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 848w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 1272w, https://substackcdn.com/image/fetch/$s_!Bdah!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F45c78eb3-7d7a-4b25-895c-5151a1a11dd9_1738x374.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Silicon Valley Bank recently published their &#8220;State of Enterprise Software 2025 Report&#8221; which has a lot of great insights on the current software startup ecosystem in terms of funding, exits and more. </p><p>Some of the key metrics they cite:</p><ul><li><p>43% YoY growth in US VC investments in enterprise software companies</p></li><li><p>1 in 6 deals involve AI/ML startups, showing the outsized role AI is playing</p></li><li><p>307 US VC-backed unicorns are enterprise software, which is 40% of ALL VC backed unicorns, up from 31% five years ago</p></li></ul><p>The below chart shows just how dominant of a role QAI is having right now in terms of fundraising:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tRXd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tRXd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 424w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 848w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 1272w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tRXd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png" width="579" height="324.74347826086955" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:516,&quot;width&quot;:920,&quot;resizeWidth&quot;:579,&quot;bytes&quot;:49025,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tRXd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 424w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 848w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 1272w, https://substackcdn.com/image/fetch/$s_!tRXd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1f0c78-7132-41b0-80c1-9fed3a75addc_920x516.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This shows 40% of capital raised from US VC funds in 2024 was from funds targeting the AI vertical.</p><p>The report also demonstrated that the &#8220;time to unicorn&#8221; has accelerated:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5_6g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5_6g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 424w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 848w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 1272w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5_6g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png" width="428" height="277.6216216216216" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:888,&quot;resizeWidth&quot;:428,&quot;bytes&quot;:49324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5_6g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 424w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 848w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 1272w, https://substackcdn.com/image/fetch/$s_!5_6g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1d24f27-95bb-41f8-a19e-61879346dfcb_888x576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Another interesting insight is the role of seed-stage exits, with companies exiting at seed stage nearly 25% of the time, which is up 13% from 2019.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XcjQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XcjQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 424w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 848w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 1272w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XcjQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png" width="477" height="285.98893805309734" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:542,&quot;width&quot;:904,&quot;resizeWidth&quot;:477,&quot;bytes&quot;:48720,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XcjQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 424w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 848w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 1272w, https://substackcdn.com/image/fetch/$s_!XcjQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d83e0a3-6f66-4feb-b614-62ad891ff54f_904x542.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://www.resilientcyber.io/p/resilient-cyber-w-bob-ritchie-securing">Resilient Cyber w/ Bob Ritchie - Securing Federal and Defense Digital Modernization</a></h3><p>In this episode, I sit down with <strong><a href="https://www.linkedin.com/company/saicinc/posts/?feedView=all">SAIC</a></strong> Chief Technology Officer (CTO) and longtime Federal/Defense leader <strong><a href="https://www.linkedin.com/in/bob-ritchie-896a654/">Bob Ritchie</a></strong> to discuss his experience securing public sector digital modernization, including everything from large multi-cloud environments to zero trust, identity, and where things are headed with AI.</p><div id="youtube2-C9v7vBIbwyA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;C9v7vBIbwyA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/C9v7vBIbwyA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p>Bob starts discussing SAIC and his background there. He went from intern to CTO over 20 years with this public sector industry leader, including a brief stint with Capital One on the commercial side.</p></li><li><p>We covered the current state of the federal cloud community across multiple clouds (e.g., Azure, AWS, and GCP) and some of the challenges and opportunities on the security front.</p></li><li><p>We often hear phrases such as &#8220;identity is the new perimeter,&#8221; but the perimeter is porous and problematic, especially in large, disparate environments such as the Federal/Defense ecosystem. Bob touched on the current state of identity security in this ecosystem, where progress is being made and what challenges still need to be tackled.</p></li><li><p>The government is doing a big push towards Zero Trust, with the Cyber EO 14028, Federal/Defense ZT strategies, and more. But how much progress is being made on ZT, and where can we look for examples of innovation and success?</p></li><li><p>We dove into the rise of excitement and adoption of AI, GenAI, Agentic AI, and protocols such as MCP, A2A, and where the public sector community can lean into Agentic AI for use cases ranging from SecOps, AppSec, GRC, and more.</p></li><li><p>Bob explains how he balances a good business focus while staying deep in the weeds and proficient in relevant emerging technologies and nuances required as a CTO.</p></li></ul><p>I&#8217;ve known Bob for several years, and you would be hard pressed to find a more competent technology leader. This is not one to miss!</p><h3><a href="https://www.linkedin.com/posts/patrickmgarrity_cybersecurity-infosecurity-riskmanagement-activity-7335560380808630272-iOLR?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Trump&#8217;s CISA Budget Lays Out Deep Job Cuts, Program Reductions</a></h3><p>There&#8217;s been a lot of focus on the current proposed budget, both in terms of spending and cuts. One area that got some attention is the proposed budget cuts to CISA in FY2026, which include $45.4 million cut from CISA&#8217;s Cyber Defense Education and Training Program, and a cut of $30.8 million to CISA&#8217;s vulnerability assessment program. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l-hE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l-hE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 424w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 848w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l-hE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png" width="482" height="344.2857142857143" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1456,&quot;resizeWidth&quot;:482,&quot;bytes&quot;:1097637,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!l-hE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 424w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 848w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 1272w, https://substackcdn.com/image/fetch/$s_!l-hE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b0d8bd2-0df8-45ba-a20e-4acd8d61ad45_1812x1294.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some have asked what this may mean for things such as the CVE program, CISA&#8217;s Vulnrichment, CISA-alerts, CISA KEV and more which the community relies on.</p><h3><a href="https://www.govexec.com/workforce/2025/06/trump-planning-slash-107000-federal-jobs-next-year-see-where/405758/">107,000 Federal Jobs Set to be Slashed Next Year</a></h3><p>New details from the presidents projected FY2026 budget show a proposed 7% reduction to non-defense agencies next fiscal year, which is roughly 107,000 employees. </p><p>The below graph helps visualize where those cuts will occur based on agency.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TQST!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TQST!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 424w, https://substackcdn.com/image/fetch/$s_!TQST!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 848w, https://substackcdn.com/image/fetch/$s_!TQST!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 1272w, https://substackcdn.com/image/fetch/$s_!TQST!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TQST!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png" width="579" height="382.1559065934066" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:961,&quot;width&quot;:1456,&quot;resizeWidth&quot;:579,&quot;bytes&quot;:178114,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TQST!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 424w, https://substackcdn.com/image/fetch/$s_!TQST!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 848w, https://substackcdn.com/image/fetch/$s_!TQST!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 1272w, https://substackcdn.com/image/fetch/$s_!TQST!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95633567-8575-4d94-a38d-18b14fcaae33_1554x1026.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://www.rstreet.org/research/the-rise-of-ai-agents-anticipating-cybersecurity-opportunities-risks-and-the-next-frontier/">Cyber Opportunities and Risks of Agentic AI</a></h3><p>As always, I've been looking for good resources on the intersection of Agentic AI and Cyber. This comprehensive piece from <strong><a href="https://www.linkedin.com/in/haiman-wong/">Haiman Wong</a></strong> and <strong><a href="https://www.linkedin.com/in/tiffany-saade/">Tiffany Saade</a></strong> from <strong><a href="https://www.linkedin.com/company/r-street-institute/">R Street Institute</a></strong> was one of the best I found this past week.<br><br>&#10145;&#65039; It provides a comprehensive breakdown on AI and Agentic AI, and its rise and interest<br>&#10145;&#65039; Breaks down the potential cybersecurity benefits of Agentic AI, such as Continuous Monitoring, VulnMgt, real-time threat detection, and augmented decision support for the broader workforce<br>&#10145;&#65039; It also lays out potential cyber considerations and risks across the four layers of Agentic AI, which include Perception, Reasoning, Action, and Memory <br><br>It cites good research on the cyber risks of AI-generated code, something the team and I at <strong><a href="https://www.linkedin.com/company/endorlabs/">Endor Labs</a></strong> have discussed quite a bit.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RDSD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RDSD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 424w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 848w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RDSD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png" width="1456" height="854" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:854,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1269284,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RDSD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 424w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 848w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 1272w, https://substackcdn.com/image/fetch/$s_!RDSD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F870f653f-5d55-4453-98e3-a45450d9ac0b_1818x1066.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#10145;&#65039; It concludes by discussing the need for industry-wide policy-based approaches, technological innovative solutions, and responsible design and deployment for end users.</p><h3><a href="https://arxiv.org/abs/2506.01333v1">Mitigating MCP Attacks &#128275;</a></h3><p>We've seen the rapid rise in popularity of MCP to enable agentic AI<br><br>We've also seen teams like <strong><a href="https://www.linkedin.com/company/invariant-labs-ai/">Invariant Labs</a></strong> and folks like <strong><a href="https://www.linkedin.com/in/idan-habler/">Idan Habler, PhD</a></strong>, and <strong><a href="https://www.linkedin.com/in/vineethsai/">Vineeth Sai Narajala</a></strong> lay out MCP vulnerabilities and potential attack paths.<br><br>This latest paper introduces the "Enhanced Tool Definition Interface" (ETDI), a security extension to fortify the MCP.<br><br>It does so through cryptographic identity verification, immutable versioned tool definitions, and explicit permission management, leveraging OAuth 2.0 and addressing potential vulnerabilities and threats to MCP that many have pointed out.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wtni!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wtni!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 424w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 848w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 1272w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wtni!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png" width="1066" height="490" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:490,&quot;width&quot;:1066,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:94726,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wtni!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 424w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 848w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 1272w, https://substackcdn.com/image/fetch/$s_!Wtni!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e30886e-b5eb-4ce4-8063-30d01367e416_1066x490.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Z1X_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Z1X_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 424w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 848w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Z1X_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png" width="1150" height="1354" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1354,&quot;width&quot;:1150,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:177407,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Z1X_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 424w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 848w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 1272w, https://substackcdn.com/image/fetch/$s_!Z1X_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3e9fcbe-4055-48c3-b2a4-5606bc0cb3b4_1150x1354.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As MCP, agents and agentic workflows become more pervasive, a secure implementation model will be necessary to ensure we don&#8217;t have a sprawling attack surface of insecure and poorly implemented MCP servers and workflows putting organizations at risk, and this paper is a great step down that path.</p><h1>AppSec, Vulnerability Management and Software Supply Chain Security</h1><h3><a href="https://www.endorlabs.com/learn/appsecs-exploitation-era-what-verizon-mandiant-and-datadog-are-telling-us">We're entering AppSec's "Exploitation Era" &#128202;</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xmfu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xmfu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 424w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 848w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 1272w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xmfu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png" width="366" height="560.3687374749499" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21188933-805a-4d60-bc19-08757bd59b59_998x1528.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1528,&quot;width&quot;:998,&quot;resizeWidth&quot;:366,&quot;bytes&quot;:736044,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xmfu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 424w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 848w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 1272w, https://substackcdn.com/image/fetch/$s_!Xmfu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21188933-805a-4d60-bc19-08757bd59b59_998x1528.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>At least, that is the overarching theme of leading reports such as DBIR, M-Trends, and Datadog's DevSecOps report. In my latest piece with <strong><a href="https://www.linkedin.com/company/endorlabs/">Endor Labs</a></strong>, I:<br><br>&#128127; Discuss the themes from these industry-leading reports, and the outsized role that application exploitation is playing<br>&#128200; The fact that traditional AppSec already struggled to keep pace, with vulnerability backlogs ballooning out of control, and teams clamoring for context from the noise<br>&#129302; The role of AI-driven development and how it is only accelerating the gap and expanding the attack surface<br>&#128161; The focus of security must be to be an early adopter and innovator with AI, much like our Development and attacker peers; if we fail to do so, the existing problems and vulnerabilities are only going to be exacerbated<br><br>AI has the potential to be a force multiplier for AppSec, but it requires rethinking how we approach longstanding challenges as opportunities.</p><h3><a href="https://boostsecurity.io/blog/weaponizing-dependabot-pwn-request-at-its-finesticd-with-style-lotp-guide">Weaponizing Dependendabot: Pwn Request at its finest</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PxGp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PxGp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 424w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 848w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PxGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png" width="564" height="263.4065934065934" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:680,&quot;width&quot;:1456,&quot;resizeWidth&quot;:564,&quot;bytes&quot;:4724215,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PxGp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 424w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 848w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 1272w, https://substackcdn.com/image/fetch/$s_!PxGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F096c8827-8edf-4b60-99c6-ca0ed5997cd0_2170x1014.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s always interesting to see the innovative and novel approaches both attackers and researchers come up with when it comes to exploiting systems. As shown in this piece, it isn&#8217;t just the code itself, but widely used projects and infrastructure which can play a role. </p><p>This article looks at the widely used and trusted Dependabot GitHub bot and how through &#8220;confused deputy&#8221; attacks it can be used to trick Dependabot into merging malicious code and even escalate into command injection and bypass branch protection rules. </p><h3><a href="https://astrix.security/learn/blog/gartners-leaders-guide-to-modern-machine-iam/">Gartner&#8217;s Leaders&#8217; Guide to Modern Machine IAM</a></h3><p>By now you&#8217;ve likely seen me writing and speaking quite a bit about identity security, including Non-Human Identities (NHI)&#8217;s. Gartner recently released their &#8220;Leaders&#8217; Guide to Modern Machine IAM&#8221;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fAs6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fAs6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 424w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 848w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 1272w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fAs6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png" width="444" height="258.89835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:849,&quot;width&quot;:1456,&quot;resizeWidth&quot;:444,&quot;bytes&quot;:526577,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/165021431?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fAs6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 424w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 848w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 1272w, https://substackcdn.com/image/fetch/$s_!fAs6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb139b38f-a033-42f3-abd3-8257101f8f4c_1474x860.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It lays out the state of Machine Identity and Access management and why this is a critical aspect of modern identity and access management (IAM) security. It also recognized firms such as Astrix as leaders in the space.</p><p>This marks Gartner&#8217;s first dedicated report on Machine IAM and demonstrates the continued growth of the sector and problem space, being recognized by one of the leader industry analyst firms. Several of us have been beating this drum for several years with deep dive pieces dedicated to the problem space, but I digress :)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #49]]></title><description><![CDATA[Agentic IAM Framework, AI Regulatory Moratorium, GitHub MCP Exploitation, Hacking LLM&#8217;s & NIST&#8217;s NVD Gets Audited]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-49</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-49</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 29 May 2025 14:20:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kKKp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to another issue of the Resilient Cyber Newsletter.</p><p>The amount of activity in the ecosystem is truly impressive, including funding, acquisitions, interviews, AI innovations and exploitations, and continued disruption across the vulnerability management ecosystem.</p><p>I hope you enjoy this week&#8217;s resources!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kKKp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kKKp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 424w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 848w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 1272w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kKKp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png" width="1456" height="1036" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1036,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2486484,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kKKp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 424w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 848w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 1272w, https://substackcdn.com/image/fetch/$s_!kKKp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaf6f6fd-7c65-4375-b814-651ad920925c_1586x1128.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://cycode.com/aspm-verse/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=resilientcyber" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w8qJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w8qJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png" width="681" height="454" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:681,&quot;bytes&quot;:931299,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://cycode.com/aspm-verse/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=resilientcyber&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w8qJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!w8qJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aacadf8-c8dd-4b46-8630-37caac54a389_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>ASPM'verse: Your Guide to Securing Software in the AI Era</h3><p>Gain critical insights into the future of application security at Cycode's ASPM'verse Virtual Summit on June 4th! Chris Hughes, Founder of Resilient Cyber, will join the speaker line-up of CISOs and Security Leaders at Worldpay, Schneider Electric, Lyft, and many more!</p><p>Unlock the Future of AppSec: Discover how Agentic AI is reshaping security strategies and explore the next frontier in protecting your applications.</p><p>Master Modern Threat Defense: Learn techniques to defend against AI-driven risks, refine your threat modeling, and secure your use of agentic coding tools.</p><p>Bridge Security &amp; Development: Gain actionable strategies for integrating ASPM with vulnerability management and breaking down silos for more effective security practices.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cycode.com/aspm-verse/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=resilientcyber&quot;,&quot;text&quot;:&quot;Register for Live &amp; On-Demand Access&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cycode.com/aspm-verse/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=resilientcyber"><span>Register for Live &amp; On-Demand Access</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h2><strong><a href="https://www.resilientcyber.io/p/resilient-cyber-w-phil-venables-security">Resilient Cyber w/ Phil Venables Security Leadership: Vulnerabilities to Venture Capital</a></strong></h2><p>In this episode, I sit down with longtime industry leader and visionary Phil Venables to discuss the evolution of cybersecurity leadership, including Phil's own journey from CISO to Venture Capitalist.</p><div id="youtube2-_dM2YQBUBXc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;_dM2YQBUBXc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/_dM2YQBUBXc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>We chatted about:</p><ul><li><p>A recent interview Phil gave about CISOs transforming into business-critical digital risk leaders and some of the key themes and areas CISOs need to focus on the most when making that transition</p></li><li><p>Some of the key attributes CISOs need to be the most effective in terms of technical, soft skills, financial acumen, and more, leaning on Phil's 30 years of experience in the field and as a multiple-time CISO</p></li><li><p>Phil's transition to Venture Capital with Ballistic Ventures and what drew him to this space from being a security practitioner</p></li><li><p>Some of the product areas and categories Phil is most excited about from an investment perspective</p></li><li><p>The double-edged sword is AI, which is used for security and needs security.</p></li><li><p>Phil's past five years blogging and sharing his practical, hard-earned wisdom at <strong><a href="https://www.philvenables.com/">www.philvenables.com</a></strong>, and how that has helped him organize his thinking and contribute to the community.</p></li><li><p>Some specific tactics and strategies Phil finds the most valuable when it comes to maintaining deep domain expertise, but also broader strategic skillsets, and the importance of being in the right environment around the right people to learn and grow</p></li></ul><p>For those who prefer audio, you can check this interview with Phil out on Spotify, and please be sure to leave a review/subscribe</p><p><strong><a href="https://open.spotify.com/episode/10EexdAGx67PiK4iIeHSvw?si=z3b59xSgQL22keWMCr8jBw">Audio Interview with Phil Venables on Spotify</a></strong></p><h3>ZScaler to Acquirer Red Canary</h3><p>Cole of Strategy of Security took to LinkedIn to point out that the ZScaler &gt; Red Canary acquisition marks one of the largest strategic acquisitions in cybersecurity history, and is specifically unique due to the fact that it isn&#8217;t a large tech firm who&#8217;s primary focus isn&#8217;t cyber (e.g. Google&#8217;s acquisition of Wiz).</p><p>It signals a very serious effort by ZScaler to expand into the world of SecOps. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jz58!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jz58!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 424w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 848w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 1272w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jz58!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png" width="658" height="763.8719723183391" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1342,&quot;width&quot;:1156,&quot;resizeWidth&quot;:658,&quot;bytes&quot;:685335,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jz58!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 424w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 848w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 1272w, https://substackcdn.com/image/fetch/$s_!Jz58!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d828ab-07a1-40dd-9837-86a7885f542b_1156x1342.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While the price isn&#8217;t disclosed, it is rumored to be around <strong>$4 Billion USD.</strong></p><h3>Funding Roundup</h3><p>Industry Analyst Richard Stienonn shared a snapshot of funding that has gone to 18 of his IT-Harvest Cyber 150. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uk70!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uk70!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 424w, https://substackcdn.com/image/fetch/$s_!uk70!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 848w, https://substackcdn.com/image/fetch/$s_!uk70!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 1272w, https://substackcdn.com/image/fetch/$s_!uk70!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uk70!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png" width="518" height="540.2317596566523" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1458,&quot;width&quot;:1398,&quot;resizeWidth&quot;:518,&quot;bytes&quot;:748027,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uk70!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 424w, https://substackcdn.com/image/fetch/$s_!uk70!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 848w, https://substackcdn.com/image/fetch/$s_!uk70!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 1272w, https://substackcdn.com/image/fetch/$s_!uk70!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d8f27b-23e3-4bfb-8e4e-137cb06b26b8_1398x1458.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://defensescoop.com/2025/05/28/hegseth-memo-it-consulting-management-services-contracts-doge/?utm_content=334122087&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-80356765">DoD Secretary of Defense Sets Restrictions on IT and Management Services Contracts</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4psm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4psm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 424w, https://substackcdn.com/image/fetch/$s_!4psm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 848w, https://substackcdn.com/image/fetch/$s_!4psm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!4psm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4psm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png" width="444" height="290.6126373626374" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:953,&quot;width&quot;:1456,&quot;resizeWidth&quot;:444,&quot;bytes&quot;:1964630,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4psm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 424w, https://substackcdn.com/image/fetch/$s_!4psm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 848w, https://substackcdn.com/image/fetch/$s_!4psm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 1272w, https://substackcdn.com/image/fetch/$s_!4psm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1e59f05-ebc6-4cc0-9fa5-071b9a9c32b2_2118x1386.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ve seen a big focus on Federal contracting, of course from DOGE. However, others are making attempts to change the Federal IT and contracting landscape as well, with a recent example from the DoD&#8217;s Secretary of Defense, who issued guidance restricting the use of IT and Management Consulting contracts without justification as to why the work cannot be done in house with existing expertise or the software/product vendors themselves.</p><p>This will have ramifications for both large and small DoD contracting firms. As someone who owns a digital services company that serves the DoD, as well as Federal Civilian agencies and has been active duty military and a Federal Civilian myself, I can tell you that this is a double edged sword.</p><p>On one hand it will force the DoD to build more internal competencies and expertise, which is indeed needed, but will be difficult to do given the recent workforce shakeups. On the other, the DoD often lacks internal expertise in the various technologies and effective implementation, making support from industry critical. </p><p>Below is a quote from the memo:</p><blockquote><p>Going forward, DOD components &#8220;may not execute new IT consulting or management services contracts or task orders with integrators or consultants -defined as entities providing system IT integration, implementation, or advisory services (e.g., designing, deploying, or managing IT systems, or offering strategic or technical IT expertise) &#8211; without first justifying that no element of the contracted effort can be: (1) accomplished by existing DoD agencies or personnel; or (2) acquired from the direct service provider, whereby the prime contractor is not an integrator or consultant,&#8221; he wrote.</p></blockquote><p>It is great that the DoD is looking to inhouse the expertise and implementation, but as I mentioned above, that expertise doesn&#8217;t often exist, at least not the scale needed to oversee its sprawling IT environment with thousands of hardware and software vendors, needing expertise in everything from cloud, kubernetes, conatainers, AI, Cyber and much more. It will require a concentrated effort to bring those skills in-house, when Federal employment is already volatile and the DoD has struggled with fostering IT talent to ensure the countless programs and projects don&#8217;t get implemented poorly, and even create cybersecurity risks.</p><h3><a href="https://www.linkedin.com/posts/peterjameswalker_seed-seriesa-seriesb-activity-7332835721776402433-smCr?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">How Many Seed Startups Get to Series B?</a></h3><p>While on the surface it may seem incredibly common for startups to launch or come out of stealth, build on Seed funding and go to Series A, Series B etc. but the reality is much different.</p><p>In typical Peter Walker fashion, Peter and the team at Carta visually demonstrate this.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Log9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Log9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 424w, https://substackcdn.com/image/fetch/$s_!Log9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 848w, https://substackcdn.com/image/fetch/$s_!Log9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 1272w, https://substackcdn.com/image/fetch/$s_!Log9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Log9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png" width="1450" height="1442" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1442,&quot;width&quot;:1450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1944298,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Log9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 424w, https://substackcdn.com/image/fetch/$s_!Log9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 848w, https://substackcdn.com/image/fetch/$s_!Log9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 1272w, https://substackcdn.com/image/fetch/$s_!Log9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf5bcef4-6adc-4b2d-b9bc-c77a11000f68_1450x1442.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As Peter lays out, even in the best market conditions it is about 32%, but in the current market and over the last several years it is closer to 15%, demonstrating just how difficult it is to mature from Seed to Series B, and how many organizations (roughly 85%) die on the vine and never mature beyond Seed/Series A to see a Series B. </p><p>This data of course isn&#8217;t specific to just cybersecurity, which have different metrics, but are likely not entirely far off. So, when you see those companies making it to Series B and beyond, it is worth recognizing the insane amount of hard work, toil, long days/nights, grind and even luck are involved. </p><h1>AI</h1><h3><a href="http://Agentic AI IAM Framework &#129302;">Agentic IAM Framework </a></h3><p>Credential compromise and sound Identity and Access Management (IAM) are longstanding challenges in cybersecurity, and they play an outsized role in incidents.<br><br>Issues include least-permissive control, proper identity lifecycle governance, and zero trust.<br><br>The potential widespread adoption of Agents and Multi-Agent Systems (MAS) is poised to exacerbate these longstanding challenges, especially as traditional identity models leave some gaps regarding agents. <br><br><strong><a href="https://www.linkedin.com/company/cloud-security-alliance/">Cloud Security Alliance</a></strong>'s new paper proposes a novel Agentic AI IAM framework.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!84Kw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!84Kw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 424w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 848w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 1272w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!84Kw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png" width="498" height="673.815652173913" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1556,&quot;width&quot;:1150,&quot;resizeWidth&quot;:498,&quot;bytes&quot;:792920,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!84Kw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 424w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 848w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 1272w, https://substackcdn.com/image/fetch/$s_!84Kw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F169b2df2-6c0f-4f21-83e7-7eb7e3d73c10_1150x1556.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p> <br>It includes key aspects such as verifiable agentic identities, decentralized identities, agent discovery, etc. I had a chance to collaborate on the paper with amazing folks such as <strong><a href="https://www.linkedin.com/in/kenhuang8/">Ken Huang, CISSP</a></strong>, <strong><a href="https://www.linkedin.com/in/johnyeoh/">John Yeoh</a></strong>, <strong><a href="https://www.linkedin.com/in/vineethsai/">Vineeth Sai Narajala</a></strong>, <strong><a href="https://www.linkedin.com/in/idan-habler/">Idan Habler, PhD</a></strong>, and others.<br><br>Identity is the core of the modern attack surface, and Agentic AI will further cement this reality.</p><p>You can check out the full paper <strong><a href="https://arxiv.org/abs/2505.19301">here</a></strong>.</p><h3><a href="https://www.dlapiper.com/en-us/insights/publications/ai-outlook/2025/ten-year-moratorium-on-ai">AI Regulation Moratorium</a></h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1c5g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1c5g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 424w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 848w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 1272w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1c5g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png" width="1456" height="326" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1611c72-ce38-4791-b535-36d8de0af003_2526x566.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:326,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178683,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1c5g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 424w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 848w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 1272w, https://substackcdn.com/image/fetch/$s_!1c5g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1611c72-ce38-4791-b535-36d8de0af003_2526x566.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>One critical topic that isn't getting nearly enough attention right now is a debate over an "AI Regulation Moratorium." The current reconciliation spending bill includes a provision that would "impose a 10-year moratorium on state-level AI regulations."<br><br>We know that it is a delicate balance between regulation and innovation. We also know there's currently no Federal overarching AI regulation, and in its place, states are looking to introduce their own regulations to fill the void. <br><br>This is an interesting and critical topic because 10 years is a long time for a technology that moves as fast as AI. On one hand, a patchwork quilt of state-level regulations would be a massive burden for businesses to navigate. On the other hand, a complete void at the Federal level leaves States little choice. <br><br>This is a classic debate of centralized vs. decentralized government, Federal vs. state, and innovation and regulation. When we look at the vast array of potential use cases for AI and the industries and aspects of society it will impact, the idea of no regulation is concerning.<br><br>Overregulating an emerging technology in its infancy could have significant economic and national security implications.</p><p>Failing to regulate such as highly-impactful technology could lead to cybersecurity and privacy risks.<br><br>Quite the conundrum.</p><h3><a href="https://www.bugcrowd.com/blog/hacking-llm-applications-a-meticulous-hackers-two-cents/">Hacking LLM Applications: A Meticulous Hackers Two Cents</a></h3><p>While there is a lot of excitement and rapid adoption of LLMs due to the business potential, there are other potential areas to consider as well. That includes how LLMs can be hacked, exploited, and used maliciously. <br><br>This is a really awesome piece from <strong><a href="https://www.linkedin.com/in/adamdawson0/">Ads Dawson</a></strong> that walks through various injection, RAG, deserialization, model inversion, and more examples. As Ads discussed in the article, LLMs have both potential AND problems. <br><br>This includes new business use cases, value, attack surfaces, and novel exploitation techniques. This is a great article that demonstrates various examples of just that.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QX8t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QX8t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 424w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 848w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 1272w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QX8t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png" width="512" height="284" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:284,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55971,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QX8t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 424w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 848w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 1272w, https://substackcdn.com/image/fetch/$s_!QX8t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce620f03-b13e-4c39-9251-5d35cd076e33_512x284.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://atlas.mitre.org/studies/AML.CS0026">Financial Transaction Hijacking with M365 Copilot as an Insider</a></h3><p>I&#8217;ve shared resources from MITRE ATLAS several times now, including a detailed write-up on ATLAS and an interview with the project lead. I also recently stumbled across these detailed real-world case studies and resources from exercises, such as this red team case study of hijacking with M365 Copilot as an insider. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Glnj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Glnj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 424w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 848w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 1272w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Glnj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png" width="1456" height="818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1847056,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Glnj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 424w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 848w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 1272w, https://substackcdn.com/image/fetch/$s_!Glnj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c660860-2237-471c-a17d-b515e56bfbe8_3350x1882.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://github.com/stacklok/toolhive">ToolHive - Making MCP Servers Easy and Secure</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ChU8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ChU8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 424w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 848w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 1272w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ChU8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png" width="1456" height="758" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:758,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:671779,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ChU8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 424w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 848w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 1272w, https://substackcdn.com/image/fetch/$s_!ChU8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0742774b-8330-4a71-a145-c78dc0d18f07_1970x1026.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We continue to see rampant excitement and adoption regarding the Model Context Protocol (MCP). That said, as I have shared many times in the newsletter and on LinkedIn, MCP also offers some fundamental challenges in terms of potential vulnerable implementations and increased attack surface. </p><p>This is an awesome project from the Stacklok crew that helps streamline the secure implementation of MCP servers by deploying secure-by-default containers that properly implement configurations such as secrets management. </p><p>It exposes SSE proxies to forward requests to MCP servers running on containers and using standard input/output (stdio) and server-sent events (SSEs). </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ndcW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ndcW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 424w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 848w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 1272w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ndcW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png" width="1456" height="850" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:850,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:164493,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ndcW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 424w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 848w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 1272w, https://substackcdn.com/image/fetch/$s_!ndcW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc47c7f6-958f-4b1a-b252-fbac81801343_2114x1234.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong><a href="https://invariantlabs.ai/blog/mcp-github-vulnerability">GitHub MCP Exploitation</a></strong></h3><p>I've been sharing a lot about potential MCP vulnerabilities and exploitation with research and publications from folks such as <strong><a href="https://www.linkedin.com/in/kenhuang8/">Ken Huang, CISSP</a></strong>, <strong><a href="https://www.linkedin.com/in/vineethsai/">Vineeth Sai Narajala</a></strong>, and <strong><a href="https://www.linkedin.com/in/idan-habler/">Idan Habler, PhD</a></strong><br><br>That discussion is now materializing into real-world demonstrations of vulnerabilities and exploitability. In this case, it involves <strong><a href="https://www.linkedin.com/company/github/">GitHub</a></strong> and the ability to expose private and potentially sensitive repositories. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2gJf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2gJf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 424w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 848w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 1272w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2gJf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png" width="1456" height="1148" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1148,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180731,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2gJf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 424w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 848w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 1272w, https://substackcdn.com/image/fetch/$s_!2gJf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f5579e7-5b06-4225-9621-e7a350cb8a69_1794x1414.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kavk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kavk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 424w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 848w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 1272w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kavk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png" width="1456" height="523" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:523,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:168233,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kavk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 424w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 848w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 1272w, https://substackcdn.com/image/fetch/$s_!Kavk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F888e6b2c-e35c-4f99-a6c7-9cadb579e397_1866x670.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is a novel attack technique demonstrating the fundamental power of prompt injection in LLM&#8217;s and how through the extension of LLMs with MCP and integration with platform providers such as GitHub, things can go sideways.</p><p>As pointed out in the article, this isn&#8217;t an issue GitHub alone can fix, and requires fine grained permissions on agents and their interactions as well as continuous monitoring of agentic activity to identify malicious use.</p><p>Great research here by <strong><a href="https://www.linkedin.com/company/invariant-labs-ai/">Invariant Labs</a></strong></p><h3><a href="https://youtu.be/1c-X-igX7u0?si=jdtFWoepDNiccJhF">Agentic Incident Response</a></h3><p>We have heard a TON about the potential of AI and Agents when it comes to security use cases, with SecOps being one of the hottest niches for the use of the technology, with a lot of investment and startups focusing on the problem.</p><p>Industry leaders are doing the same, and one of them is Google/Mandiant.</p><p>I came across this demo from Daniel Dye who walks through a use of Google&#8217;s Gemini LLM, coupled with their ADK, and various agents working under a incident management agent and correlating evidence, investigating, providing findings and more. </p><p>This is one of the best demonstrations I&#8217;ve seen of the technology for the SecOps use cases yet, and really demonstrates the potential power of agentic AI for cybersecurity, including incident response.</p><p>He involves a Malware Incident Response Plan (IRP) runbook and watches the agents go to work, see below yourself.</p><div id="youtube2-1c-X-igX7u0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1c-X-igX7u0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1c-X-igX7u0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1>AppSec, Vulnerability Management and Software Supply Chain Security</h1><h3><a href="https://www.oig.doc.gov/wp-content/OIGPublications/Audit-of-NISTs-Management-of-the-National-Vulnerability-Database.pdf">NIST&#8217;s National Vulnerability Database Gets Audited</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BJuu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BJuu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 424w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 848w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BJuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png" width="1412" height="1336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1336,&quot;width&quot;:1412,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:333499,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BJuu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 424w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 848w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 1272w, https://substackcdn.com/image/fetch/$s_!BJuu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F097505fa-ed3f-4d3b-ac4d-335c06a4ec8e_1412x1336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ve shared many times over the past 18 months about the struggles of NIST&#8217;s NVD, including a standalone deep dive article on its near collapse and continued struggles, as well as an interview with folks such as Dan Lorenc and Josh Bressers. </p><p>Now, it is appears the Department of Commerce will be auditing NVD and its continued struggles to keep up with CVE enrichment and provide the level of services that the community requires for vulnerability management purposes. </p><p>Below you can see the continued decline and issues with the NVD keeping enrichment pace up with the overall pace of CVE growth, likely due to issues the NVD has discussed themselves, such as staffing, funding, technical debt and legacy systems and more.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LtRa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LtRa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 424w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 848w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 1272w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LtRa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png" width="1456" height="777" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:777,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:389162,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LtRa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 424w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 848w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 1272w, https://substackcdn.com/image/fetch/$s_!LtRa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9686cc4-f8bd-4a88-b564-b2bfd294ef0d_1826x974.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my opinion, this will likely further bolster calls from the community for the CVE program to be driven by industry, via a non-profit, see below, for a conversation on just that.</p><h3><a href="https://youtu.be/Ofy0LxkwkT8?si=E8pfs7gcSJgjON1A">CVE Foundation Interview</a></h3><p>In the wake of the near collapse of CVE I have shared several resources on the CVE Foundation, what their goals are and what they envision for the future of the CVE program.</p><p>John Hammond recently had a great interview with Pete Allor of the CVE Foundation that I wanted to share here where they dive into a lot of those topics. </p><div id="youtube2-Ofy0LxkwkT8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Ofy0LxkwkT8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Ofy0LxkwkT8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3><a href="https://www.chainguard.dev/unchained/this-shit-is-hard-inside-the-chainguard-factory">Inside the Chainguard Factory</a></h3><p><strong><a href="https://www.linkedin.com/company/chainguard-dev/">Chainguard</a></strong> just dropped a deep dive into their &#8220;Factory&#8221; &#8212; a real-world blueprint for building secure software infrastructure at scale.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TYpO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TYpO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 424w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 848w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 1272w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TYpO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png" width="504" height="336.8076923076923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:973,&quot;width&quot;:1456,&quot;resizeWidth&quot;:504,&quot;bytes&quot;:751087,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TYpO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 424w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 848w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 1272w, https://substackcdn.com/image/fetch/$s_!TYpO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feaf9fe10-7201-4d81-a17c-03f675cdb014_2944x1968.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Key highlights:<br><br>&#10145;&#65039; Purpose-built for security: A cloud-native Linux distro bootstrapped from source with verifiable builds, minimal attack surface, and automated vulnerability management.<br>&#10145;&#65039; Build system = production system: Runs on Kubernetes, with the same rigor and security in your build system as in your runtime environments.<br>&#10145;&#65039; Human + Automation + AI: Engineers ensure quality, bots trigger event-driven updates, and AI agents simplify troubleshooting.<br>&#10145;&#65039; Secure delivery: Ephemeral OIDC auth, native integration with standard artifact managers, and dev-friendly tooling to eliminate blind spots in image distribution.<br><br>This isn&#8217;t theoretical design &#8212; it's a production infrastructure and build system that&#8217;s working today.<br><br>Chainguard has long been a leader in building secure-by-design open source artifacts with minimal attack surfaces and vulnerabilities, so it&#8217;s great to get a peek behind the curtain of the factory powering their products.</p><h3><a href="https://www.ox.security/the-kev-illusion-separating-true-threats-from-pretend-critical-risks/">Context is King, even for KEVs</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qs4M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qs4M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 424w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 848w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 1272w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qs4M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png" width="1348" height="646" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac094773-9458-486c-ab0c-149bc0085786_1348x646.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:646,&quot;width&quot;:1348,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:864223,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164405723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qs4M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 424w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 848w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 1272w, https://substackcdn.com/image/fetch/$s_!Qs4M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac094773-9458-486c-ab0c-149bc0085786_1348x646.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ve often quipped context is king when it comes to vulnerability management, due to the fact that organizations desperately need context such as known exploitation, exploitability, reachability and organizational context to make effective use of vulnerability data. </p><p>In fact, this was a common theme in my recent conversation with Jay and Michael of Empirical Security, who are building localized models using AI and data science for organizational-specific vulnerability management models. </p><p>Ox Security recently released a report titled &#8220;<strong><a href="https://www.ox.security/the-kev-illusion-separating-true-threats-from-pretend-critical-risks/">The KEV Illusion</a></strong>&#8221; where they demonstrate that organizational context is just as important for KEVs as it is for other CVEs and vulnerabilities, due to the fact that not all KEVs impact all environments and organizations and even if they do, factors such as existing exploits, exploit maturity, exploitability and compensating controls are all still very relevant.</p><p>The current paradigm, including in the U.S. Federal/DoD space where I spend a lot of my time is to &#8220;patch all KEVs within x timeframe&#8221;, without taking the above context into consideration whatsoever. This is a good example of where compliance drives security, forcing organziations to prioritize KEVs but also demonstrates that compliance is a blunt instrument that often lacks nuance, forcing organizations to prioritize the patching of CVEs that may not actually impact them or pose any real risks. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #48]]></title><description><![CDATA[Coinbase Incident - Markets Yawn, Palo Alto Earnings Call, MCP Potential & Pitfalls, Security for High Velocity Engineering, & AI Slop]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-48</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-48</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 22 May 2025 15:51:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MVmV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to issue #48 of the Resilient Cyber Newsletter.</p><p>Things continue to be incredibly active in the community, from earnings calls, incidents, AI resources, emphasis on MCP&#8217;s integral role, and insights around the vulnerability and AppSec space. </p><p>I hope you enjoy all of the resources this week!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MVmV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MVmV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 424w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 848w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MVmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png" width="535" height="381.04052197802196" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1037,&quot;width&quot;:1456,&quot;resizeWidth&quot;:535,&quot;bytes&quot;:2545051,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MVmV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 424w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 848w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 1272w, https://substackcdn.com/image/fetch/$s_!MVmV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7cd65d41-aab0-4f28-ae54-7127d7266709_1598x1138.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Il_N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Il_N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 424w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 848w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 1272w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Il_N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png" width="352" height="49.07692307692308" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:203,&quot;width&quot;:1456,&quot;resizeWidth&quot;:352,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Il_N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 424w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 848w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 1272w, https://substackcdn.com/image/fetch/$s_!Il_N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25bac48c-423d-4a7b-981a-504f6f645c9d_4777x665.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Break Security Silos. Accelerate Cloud Defense.</h3><h4>Unified security from code to cloud to SOC.</h4><p>Tool sprawl and team silos don&#8217;t just slow response&#8212;they increase risk. This guide dives into how AI, automation, and unified data bring AppSec, CloudSec, and SecOps together to detect threats faster and act with precision. It&#8217;s a smart read for security leaders rethinking their architecture.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.paloaltonetworks.com/resources/guides/cortex-cloud-executive-guide&quot;,&quot;text&quot;:&quot;Read the Executive Guide&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.paloaltonetworks.com/resources/guides/cortex-cloud-executive-guide"><span>Read the Executive Guide</span></a></p></blockquote><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.linkedin.com/pulse/coinbase-incident-why-market-signals-say-cyber-risk-still-richards-mx1ic/?trackingId=N2kE1zynZtX1Y7zKo3Lg%2Fw%3D%3D">Coinbase Incident - Markets Yawn</a></h3><p>If you&#8217;ve been following me or others like Kelly Shortridge, you&#8217;ve likely heard the phrase &#8220;Markets DGAF about Cybersecurity&#8221;. Public markets don&#8217;t care much about cybersecurity, including incidents impacting organizations, and I&#8217;ve shared research before demonstrating that markets often shrug when incidents occur. Research shows that stock/share prices may slightly dip, but they usually recover in less than 50 days and rise to pre-incident rates.</p><p>That seems to be the case again with Coinbase's recent incident. Coinbase was involved in an insider-driven compromise via social engineering, including a $20M ransom demand. Following the incident, Coinbase&#8217;s stock <em><strong>rose</strong></em>. </p><p>In this article from X-Analytics, they mention that the projected financial impact to Coinbase is about ~$50M, or <em><strong>0.8% </strong></em>of their annual revenue, despite public headlines that it could be $400M. </p><p>In the article, they make the article that cyber events, even the &#8220;serious&#8221; ones aren&#8217;t priced in as being &#8220;material&#8221; to the business value, unless:</p><ul><li><p>Massive consumer trust erosion occurs </p></li><li><p>Regulatory punishment escalates</p></li><li><p>Financial performance takes a hit</p></li></ul><p>The closing quote is the most damning</p><blockquote><p><strong>&#8220;Cyber risk is still mostly noise unless it hits revenue, reputation or regulation at scale.&#8221;</strong></p></blockquote><h3><a href="https://www.scworld.com/news/cybersecurity-salaries-in-2025-shifting-priorities-rising-demand-for-specialized-roles">Cybersecurity Salaries in 2025: Shifting priorities, rising demand for specialized roles</a></h3><p>We have discussed the cyber workforce in several recent newsletters and articles, including widespread layoffs that impacted many in the community. This latest article examines CyberSN&#8217;s &#8220;<strong><a href="https://cybersn.com/cybersecurity-salary-data-report-2025/">Cybersecurity Salary Data Report 2025</a></strong>&#8221; and some of the key findings. </p><p>Some of the key findings include:</p><ul><li><p>Specialists and leaders see pay increases</p></li><li><p>GRC and compliance roles hold steady</p></li><li><p>Generalist and support roles plateau</p></li><li><p>Skill-based hiring gains ground</p></li></ul><p>The report indicates that key areas such as Cloud, IAM, DevSecOps, and Product Security are seeing intense competition and compensation. GRC has also stayed relatively stable, which isn&#8217;t surprising given the increased regulatory and compliance requirements organizations face. </p><p>That said, general cyber roles have begun to stagnate, resulting in lower and less salary growth overall. Organizations are slowly shifting towards skill-based hiring, meaning YoE isn&#8217;t an automatic slam dunk, and employers want to evaluate the skills of the resources they hire. </p><h3><a href="https://www.linkedin.com/posts/elad-erez_highlighting-panw-q325-earnings-call-by-activity-7330933847422836736-EzYk?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Palo Alto Networks (PANW) Strong Q3&#8217;25 Earnings Call</a></h3><p>Several folks in my network have begun sharing some highlights from PANW&#8217;s recent earnings call, and overall, the firm has done stellar.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cnb_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cnb_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 424w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 848w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 1272w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cnb_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png" width="290" height="354.5017793594306" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1374,&quot;width&quot;:1124,&quot;resizeWidth&quot;:290,&quot;bytes&quot;:627176,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cnb_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 424w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 848w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 1272w, https://substackcdn.com/image/fetch/$s_!Cnb_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cde3ab3-450d-4754-a908-06ea3000a674_1124x1374.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This includes:</p><ul><li><p>Several double digit deals in the tens of millions, largely driven by platformization and CSIAM, they attribute 90~ of net new deals to the platformization push</p></li><li><p>200% ARR Growth (YoY) for XSIAM with an &gt;$1M average ARR, and the CEO even stated, &#8220;on a trailing 12-month basis, XSIAM bookings are approaching $1 Billion.&#8221;</p></li><li><p>6,000 SASE customers</p></li><li><p>~3M Access Browser Seats, which is +1,100% YoY growth</p></li><li><p>$700M Acquisition Of Protect AI, which was announced during RSA, and they state is a $15B TAM</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kxRs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kxRs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 424w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 848w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 1272w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kxRs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png" width="1456" height="711" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:711,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1198470,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kxRs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 424w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 848w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 1272w, https://substackcdn.com/image/fetch/$s_!kxRs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6415c509-3254-417e-be9c-4ac6d203a3b6_1840x898.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>PANW&#8217;s CEO recently went live with Jim Cramer, during which they discussed a range of topics, including the firm's performance and its Protect AI acquisition.</p><div id="youtube2-mxBX7jiYnew" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;mxBX7jiYnew&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/mxBX7jiYnew?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div></li></ul><h3><a href="https://media.defense.gov/2025/May/21/2003719846/-1/-1/0/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF">Russian GRU Targeting Western Logistics Entities and Technology Companies</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wvWn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wvWn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 424w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 848w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 1272w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wvWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png" width="496" height="319.1978021978022" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:937,&quot;width&quot;:1456,&quot;resizeWidth&quot;:496,&quot;bytes&quot;:2312696,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wvWn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 424w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 848w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 1272w, https://substackcdn.com/image/fetch/$s_!wvWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eff2298-dd8b-472f-953c-de9ed0fd1fea_2440x1570.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>CISA and partners released a publication explaining how Russian state-sponsored cyber campaigns have been targeting Western logistics entities and technology companies, continuing the trend of cyber being a modern pillar of warfare. This included organizations involved in providing assistance to Ukraine, which makes sense given the ongoing conflict between Russia and Ukraine. </p><p>The publication provides a:</p><ul><li><p>Description of targets</p></li><li><p>Initial Access TTPs</p></li><li><p>Post-Compromise TTPs</p></li><li><p>Indicators of Compromise (IoC)</p></li></ul><p>And more, as well as resources organizations can use to mitigate risks from this threat actor.</p><h1>AI</h1><h3><a href="https://www.resilientcyber.io/publish/post/164102682">Resilient Cyber w/ Vineeth: Model Context Protocol (MCP) - Potential &amp; Pitfalls</a> </h3><p>In this episode, I discuss the Model Context Protocol (MCP) with the OWASP GenAI Co-Lead for Agentic Application Security. <br><br>We will discuss MCP's potential and pitfalls, its role in the emerging Agentic AI ecosystem, and how security practitioners should think about secure MCP enablement.</p><div id="youtube2-8DLP8pOF_Uo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;8DLP8pOF_Uo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/8DLP8pOF_Uo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>We discussed: </p><ul><li><p>MCP 101, what it is and why it matters</p></li></ul><ul><li><p>The role of MCP as a double-edged sword, offering opportunities but additional risks and considerations from a security perspective</p></li></ul><ul><li><p>Vineeth's work on the "Vulnerable MCP" project is a repository of MCP risks, vulnerabilities, and corresponding mitigations.</p></li></ul><ul><li><p>How MCP is also offering tremendous opportunities on the security-enablement side, extending security capabilities into AI-native platforms such as Claude and Cursor and security vendors releasing their own MCP servers</p></li></ul><ul><li><p>Where we see MCP heading from a research and implementation perspective</p></li></ul><h3><a href="https://arxiv.org/pdf/2505.10609v1">Agent Name Service (ANS): A Universal Directory for Secure AI Agent Discovery and Interoperability</a></h3><p>Speaking of Vineeth, another major project he is involved in is the ANS effort, which is being positioned as &#8220;DNS&#8221; for agents. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OQYY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OQYY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 424w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 848w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 1272w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OQYY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png" width="1456" height="807" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:807,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:135339,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OQYY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 424w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 848w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 1272w, https://substackcdn.com/image/fetch/$s_!OQYY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F59ebf2f9-3a71-4f0d-9e11-a690bc8c7de7_1610x892.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This informative paper discusses core aspects of ANS and why it is needed as agentic architectures and agents more broadly become more common place, drawing inspiration from DNS. It discusses core aspects such as a Agent Registry, Registration Authority, Certificate Authority and more. </p><h3><a href="https://github.com/Ashfaaq98/awesome-genai-cyberhub">Awesome GenAI Cyber Hub</a></h3><p>I stumbled across this repository, a collection of LLM applications in cybersecurity. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Oi9n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Oi9n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 424w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 848w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 1272w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Oi9n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png" width="414" height="216.66758241758242" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:762,&quot;width&quot;:1456,&quot;resizeWidth&quot;:414,&quot;bytes&quot;:1799515,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Oi9n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 424w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 848w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 1272w, https://substackcdn.com/image/fetch/$s_!Oi9n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ffe0522-d360-420f-a147-b1e1a1101ff2_1552x812.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>It includes key areas such as:</p><ul><li><p>AI SOC</p></li><li><p>Vulnerability and Malware Analysis</p></li><li><p>Detection Engineering</p></li><li><p>OffSec</p></li></ul><p>And more. </p><h3><a href="https://xvnpw.github.io/posts/threat-modeling-with-llms-two-years-in-hype-hope-and-a-look-at-gemini-2.5-pro/">Threat Modeling with LLMs: Two Years In - Hype, Hope, and a Look at Gemini 2.5 Pro</a></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T7c6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T7c6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 424w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 848w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 1272w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T7c6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png" width="366" height="247.37016574585635" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:734,&quot;width&quot;:1086,&quot;resizeWidth&quot;:366,&quot;bytes&quot;:1402895,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T7c6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 424w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 848w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 1272w, https://substackcdn.com/image/fetch/$s_!T7c6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc67e3b30-a09f-4366-a2dc-dfa6875f2c81_1086x734.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We continue to see the exploration of use cases for LLMs, including in security. In this case, researchers have spent the last several years tinkering with LLMs for threat modeling and providing their thoughts on their performance for the use case. </p><p>They cite LLMs' substantial value and utility for threat modeling and the need for expert human analysis and involvement. They also cite open-source resources such as TM Bench and others that show how various models perform on threat modeling and associated tasks. </p><p>The researcher provides a lot of great thoughts based on testing and experimentation, but also concludes that they do not see threat modeling being fully automated by LLMs at their current state and capabilities. </p><h3><a href="https://www.cybersec-automation.com/p/integrating-ai-agents-into-existing-soc-workflows-best-practices-61391cdca6acf83b">Integrating AI Agents into Existing SOC Workflows: Best Practices</a></h3><p>Filip Stojkovski continues to share excellent AI content, specifically around SecOps. His latest piece is more of the same, focusing on best practices for integrating AI agents into SOC workflows. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e3mt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e3mt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 424w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 848w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 1272w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e3mt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif" width="505" height="897.7777777777778" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1920,&quot;width&quot;:1080,&quot;resizeWidth&quot;:505,&quot;bytes&quot;:399270,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e3mt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 424w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 848w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 1272w, https://substackcdn.com/image/fetch/$s_!e3mt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67e4a34-6c0d-42bf-a041-d3e6dca6d695_1080x1920.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>He recommends starting with the &#8220;ugliest, most soul-crushing tasks&#8221;, such as:</p><ul><li><p>Alert triage in noise, context-heavy sources such as EDR</p></li><li><p>Context gathering from 5+ tools for every incident</p></li><li><p>Enrichment that analysts always forget to do </p></li></ul><p>He also discusses the need to train the team rather than just the model, including demystifying the tech, teaching prompting and delegation, participating in hands-on labs, and formalizing the role of &#8220;Agent Supervisor.&#8221; </p><p>Refreshingly, he also lays out several pitfalls to expect, especially on the integration front with changing API&#8217;s and even pushback from analysts worried about job security.</p><h3><a href="https://arxiv.org/abs/2505.10468">AI Agents vs. Agentic AI</a> </h3><p>There's a TON of discussion right now about AI Agents and Agentic AI. The two concepts are closely related but have some unique considerations and characteristics. This paper does a great job of helping the reader understand AI Agents and Agentic AI, what distinguishes one from the other, and the role the former plays in the latter. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lYRk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lYRk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 424w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 848w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 1272w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lYRk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png" width="587" height="325.75274725274727" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:587,&quot;bytes&quot;:823982,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lYRk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 424w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 848w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 1272w, https://substackcdn.com/image/fetch/$s_!lYRk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5c2491e-693f-42b1-97dc-5f197d398349_2122x1178.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>It discusses their architecture, scope/complexity, the way interactions occur in Agentic AI, and the role of autonomy.</p></li><li><p>Key differentiators, such as being specific to a task or involving multi-step complex tasks, requiring coordination and learning specific to the domain or across environments.</p></li><li><p>The importance of specialized agents collaborating, decomposing tasks, persistent memory, and orchestration.</p></li><li><p>Security and Adversarial risks, including the expanded attack surface, tool manipulation, model poisoning, and more.<br><br>This is a good read for those looking to understand AI Agents and Agentic AI better and see where the industry is headed across countless verticals and use cases.</p></li></ul><h1>AppSec, Vulnerability Management, and Supply Chain Security</h1><h3><a href="https://www.resilientcyber.io/p/quantifying-ais-impact-on-data-risk">Quantifying AI's Impact on Data Risk &#128202;</a></h3><p>The discussion around AI and cybersecurity can be overwhelming. Everything from models, prompts, open vs. closed source, supply chain, data exposure, and more.<br><br>That's why I was excited to check out <strong><a href="https://www.linkedin.com/company/varonis/">Varonis</a></strong>'s "2025 State of Data Security Report." It looked at over 1,000 real-world environments and investigated AI's impact on data risk.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!okvo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!okvo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 424w, https://substackcdn.com/image/fetch/$s_!okvo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 848w, https://substackcdn.com/image/fetch/$s_!okvo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 1272w, https://substackcdn.com/image/fetch/$s_!okvo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!okvo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png" width="330" height="428.58490566037733" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:826,&quot;width&quot;:636,&quot;resizeWidth&quot;:330,&quot;bytes&quot;:540000,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!okvo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 424w, https://substackcdn.com/image/fetch/$s_!okvo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 848w, https://substackcdn.com/image/fetch/$s_!okvo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 1272w, https://substackcdn.com/image/fetch/$s_!okvo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff98e1536-6030-4225-8758-6567d1d9dfc4_636x826.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some of the key findings include:<br><br>&#128214; 90% of organizations have exposed sensitive cloud data that can be surfaced and trained on by AI, for better or worse<br>&#128123; 88% of organizations have stale ghost users, dormant accounts that still have access to applications and data, making them prime targets for compromise, lateral movement, and more.<br>&#128065;&#65039; 98% of organizations have unverified and unsanctioned AI apps, e.g., "Shadow AI", with little oversight or involvement from security teams<br><br>The report also has much more, including overly permissive accounts, unencrypted data, exposure to agentic and AI threats, and the list goes on. This is an insightful report that shows the intersection of AI, cloud, and security risks across over a thousand organizations, with a large potential for compromise and impact.<br><br>I dive into everything in my article below, so check it out! </p><h3><strong><a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">ASPM &#8217;verse Virtual Conference</a></strong></h3><p>You&#8217;ve likely heard of &#8220;<em>Application Security Posture Management (ASPM)</em>&#8221;. If not, you can check out my article with Francis Odum titled &#8220;<strong><a href="https://www.resilientcyber.io/p/the-rise-of-application-security">The Rise of Application Security Posture Management (ASPM) Platforms</a></strong>&#8221;.</p><p>The AppSec space continues to become more complex, from vulnerability management and prioritization to tooling. Throw AI into the mix, and it is poised for some fundamental transformations in how we approach AppSec.</p><p>That is why I am excited to share that I am joining Cycode for their ASPM &#8217;verse event, I&#8217;ll be speaking in a fireside chat on:<br><br><strong>&#8220;<a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">The Future of Application Security: 3 Ways Agentic AI is Changing Security in 2025</a>&#8221; &#128272;&#129302;</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AGe7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 424w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 848w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1272w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png" width="334" height="324.135989010989" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1413,&quot;width&quot;:1456,&quot;resizeWidth&quot;:334,&quot;bytes&quot;:1338142,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!AGe7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 424w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 848w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1272w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ll dig into:<br>&#9989; How AI is reshaping modern AppSec strategies<br>&#9989; Defending against evolving vulnerabilities and supply chain threats<br>&#9989; Transforming your security posture to meet the pace of innovation<br><br>&#128467; June 4, 2025<br>&#128346; 11AM ET | 8AM PT<br>&#128187; Virtual &amp; FREE to attend!<br><br>Join me and other AppSec leaders as we explore what&#8217;s next for security in the age of AI - with this <strong><a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">LINK</a></strong>.</p><h3><a href="https://a.co/d/bZC1WjH">Cyber Hard Problems &#129513;</a></h3><p>I saw <strong><a href="https://www.linkedin.com/in/philvenables/">Phil Venables</a></strong>' post about this last week, so I grabbed a physical copy and am looking forward to digging into it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZK6K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZK6K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 424w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 848w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 1272w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZK6K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png" width="367" height="269.4526098901099" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1069,&quot;width&quot;:1456,&quot;resizeWidth&quot;:367,&quot;bytes&quot;:3879070,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZK6K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 424w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 848w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 1272w, https://substackcdn.com/image/fetch/$s_!ZK6K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccb95353-0ee3-4138-87d8-ff01dac66ffa_1774x1302.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As the book points out, cyber systems now power everything from consumer goods to critical infrastructure, even playing a key role in modern geopolitics and nation-state conflicts.<br><br>The study was sponsored by the <strong><a href="https://www.linkedin.com/company/cyberdirector/">Office of the National Cyber Director, The White House</a></strong>, and includes support from the <strong><a href="https://www.linkedin.com/company/national-science-foundation/">National Science Foundation (NSF)</a></strong><br><br>It looks at what some of the "cyber hard problems" are, including taking a look at:<br><br>- The role of cyber in modern digital society<br>- Key considerations for cyber resiliency from engineering to complexity<br>- Problem spaces such as Risk Assessment and Trust, Secure Development, System Composition, Supply Chain, and Policy &amp; Economic Incentives<br>- The producer perspective is also essential, as is the role of software vendors and suppliers in the broader ecosystem. <br><br>The research and publication aim to help inform and empower a community response.<br><br>When I saw that it involves folks such as <strong><a href="https://www.linkedin.com/in/hyrumanderson/">Hyrum Anderson</a></strong>, <strong><a href="https://www.linkedin.com/in/josiah-dykstra/">Josiah Dykstra</a></strong>, <strong><a href="https://www.linkedin.com/in/wendynather/">Wendy Nather</a></strong>, and other industry leaders, I knew it was going to be a good one.</p><p>I finally got the chance to read this piece from <strong><a href="https://www.linkedin.com/in/jasonbchan/">Jason Chan</a></strong>, which I've been wanting to dive into for a week. </p><h3><a href="https://tldrsec.com/p/security-for-high-velocity-engineering">Security for High Velocity Engineering</a></h3><p>I finally got the chance to read this piece from <strong><a href="https://www.linkedin.com/in/jasonbchan/">Jason Chan</a></strong>, which I've been wanting to dive into for a week. It didn't disappoint &#128293;</p><p><br>Jason talks about the fundamental shifts over the years (decades) among software development and technology/business more broadly, and key methodologies to enable secure high velocity engineering.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eaWH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eaWH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 424w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 848w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 1272w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eaWH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png" width="1456" height="398" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:398,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178953,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eaWH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 424w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 848w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 1272w, https://substackcdn.com/image/fetch/$s_!eaWH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd225cda9-9350-4e84-a577-e8fddf0d5bed_1682x460.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It covers:<br><br>&#128683; Shutting down the tired mantra of "security is everyone's job!"<br>&#128076; The importance of context, strategy, and execution in effective security<br>&#129504; How critical it is to align with the developer experience to maximize flow state, enable effective feedback loops, and minimize cognitive load.<br><br>Most security teams fail to do this effectively, which is why we are avoided, worked around, and perpetuate the age-old "bolted on, not built-in" security paradigm.<br><br>&#128200; Real-world challenges include security's sublinear growth compared to overall company growth, despite the need to support the entire business, emphasizing the need for scalability.<br>&#128721; The reality that gates are anti-patterns to developer productivity, and guardrails facilitate flow (and engagement), and the role of paved roads.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pGQv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pGQv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 424w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 848w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 1272w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pGQv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png" width="502" height="282.0302197802198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:818,&quot;width&quot;:1456,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:319273,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pGQv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 424w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 848w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 1272w, https://substackcdn.com/image/fetch/$s_!pGQv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fead46c2f-4a80-46e0-b905-a02fd8f5a6d8_1708x960.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is a pragmatic and informed approach to security, focusing on the importance of Context, Strategy, and, most importantly, Execution to enable secure velocity among engineering and break with longstanding security anti-patterns that impede it.</p><h3><a href="https://arstechnica.com/gadgets/2025/05/open-source-project-curl-is-sick-of-users-submitting-ai-slop-vulnerabilities/">curl Sick of Users Submitting &#8220;AI Slop&#8221; Vulnerabilities</a></h3><p>We, of course, know that there is a lot of excitement around AI use cases, including potentially helping find vulnerabilities. That is promising and has a lot of potential to identify and even potentially remediate vulnerabilities one day. </p><p>However, right now, the process is far from perfect. The author and lead of the widely popular open source project &#8220;curl&#8221; took to LinkedIn to discuss how they&#8217;re basically being DDoSed by AI-generated findings and reports, rather than actual vulnerability researchers. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JIM8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JIM8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 424w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 848w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 1272w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JIM8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png" width="1456" height="193" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:193,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:76847,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JIM8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 424w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 848w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 1272w, https://substackcdn.com/image/fetch/$s_!JIM8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4d4c5684-cba3-4b14-9273-b596297c2327_1768x234.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Most the heartache is coming via their involvement in the bug reporting program HackerOne. Daniel outright stated the reports they&#8217;re seeing are &#8220;AI-slop&#8221;. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SvSg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SvSg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 424w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 848w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 1272w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SvSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png" width="1456" height="294" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/86c2148b-5896-45da-9023-12d589767cc5_1762x356.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:294,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:138790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SvSg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 424w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 848w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 1272w, https://substackcdn.com/image/fetch/$s_!SvSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86c2148b-5896-45da-9023-12d589767cc5_1762x356.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The article goes on to discuss Daniel's reaching out to HackerOne to try to address the issue and HackerOne's perspective on actions they&#8217;re taking to improve the fidelity of reports, including those that include AI tooling usage.</p><h3><a href="https://www.linkedin.com/pulse/why-learn-security-fundamentals-when-we-could-just-chase-our-nqrjc/?trackingId=xLhZysOFSU68h%2BVp2mhqqA%3D%3D">It&#8217;s All Just Software</a></h3><p>I have been discussing how cybersecurity tools are software, much like the very same software they are designed to protect. This means they have flaws and vulnerabilities and are ultimately part of your attack surface.  </p><p>That is why I was pleased to see myself cited in the latest CISO Series blog alongside folks I respect, such as Ross Haleliuk, Christofer Hoff, and others. They spoke about how my article highlights that security tools add to our attack surface and can introduce more risk than they mitigate in some cases. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AgLA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AgLA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 424w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 848w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AgLA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png" width="446" height="308.1565934065934" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1006,&quot;width&quot;:1456,&quot;resizeWidth&quot;:446,&quot;bytes&quot;:3098502,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163945196?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AgLA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 424w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 848w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!AgLA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19123420-6755-4dc5-ae1a-817100ae1ff4_1626x1124.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Quantifying AI's Impact on Data Risk ]]></title><description><![CDATA[A look at Varonis' 2025 State of Data Security Report, including insights from over 1,000 real-world environments]]></description><link>https://www.resilientcyber.io/p/quantifying-ais-impact-on-data-risk</link><guid isPermaLink="false">https://www.resilientcyber.io/p/quantifying-ais-impact-on-data-risk</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Wed, 21 May 2025 15:14:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ABp8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re like me, as a cybersecurity practitioner, you&#8217;ve likely been doing your best to keep up with the rapid pace of innovation and acceleration in AI and its impact on cybersecurity. </p><p>Everything from models, prompts, open vs. closed-sourced models, supply chain concerns, data exposure, and more. You&#8217;re likely also curious about the actual impact of AI on data risks. As we continue to see organizations rapidly adopting this technology, security teams and leaders continue to have valid concerns around data exposure, leaks, sensitive data disclosure, and other data-centric concerns. </p><p>That&#8217;s why I&#8217;m excited to read Varonis's <a href="https://hubs.ly/Q03nrsQD0">new report</a>, &#8220;<strong><a href="https://hubs.ly/Q03nrsQD0">2025 State of Data Security Report: Quantifying AI&#8217;s Impact on Data Risk: Insights from 1,000 real-world IT environments.</a></strong>&#8221; </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ABp8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 424w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 848w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ABp8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png" width="320" height="414.11764705882354" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1584,&quot;width&quot;:1224,&quot;resizeWidth&quot;:320,&quot;bytes&quot;:2907824,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ABp8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 424w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 848w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 1272w, https://substackcdn.com/image/fetch/$s_!ABp8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8e492b1-faa9-4809-abdf-9f52c4b3619b_1224x1584.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>Key Findings</h1><p>The<a href="https://hubs.ly/Q03nrsQD0"> report</a> starts by looking at key findings, and unsurprisingly, it states that AI adoption is outpacing security measures. This is a tale as old as time, and it is why we have phrases about security often being bolted on rather than built on. </p><p>The reasons for this perpetual cycle are deep, including longstanding fractured relationships between security and the business due to our risk-averse nature, as well as the fact that AI security tooling is lagging behind AI business-specific functionality and integrations, as is often the case with any emerging technology. </p><p>That said, the <em>how</em> in terms of this lag is where the risks are manifesting, see below:</p><p>The concerns are wide-ranging and have a strong potential for real organizational risks. For example, 90% of organizations have sensitive data publicly exposed, which could be accessed by AI and even included in subsequent models via model pre-training. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yeGN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 424w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 848w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 1272w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yeGN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png" width="535" height="174.1636690647482" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20b36583-8073-444d-a433-225561f8fb05_1112x362.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:362,&quot;width&quot;:1112,&quot;resizeWidth&quot;:535,&quot;bytes&quot;:189353,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yeGN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 424w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 848w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 1272w, https://substackcdn.com/image/fetch/$s_!yeGN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20b36583-8073-444d-a433-225561f8fb05_1112x362.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>We know credential compromise has been a problem for years. As the saying goes, hackers don&#8217;t hack in; they log in. Often, compromised credentials, including stale user accounts and credentials, exist. The <a href="https://hubs.ly/Q03nrsQD0">report</a> found that 88% of organizations have stable enabled &#8220;ghost users,&#8221; active accounts with application and data access that aren&#8217;t actively used. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ggGn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 424w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 848w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 1272w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ggGn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png" width="542" height="206.92819614711033" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:436,&quot;width&quot;:1142,&quot;resizeWidth&quot;:542,&quot;bytes&quot;:208072,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ggGn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 424w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 848w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 1272w, https://substackcdn.com/image/fetch/$s_!ggGn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcef27a42-0b13-4c30-b77f-1d47076639c5_1142x436.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This creates situations where the accounts can be used maliciously and go undetected because they are seen as legitimate users or used to move laterally throughout environments. Couple that with the rise of Non-Human Identities (NHI), which are poised to outnumber human users/credentials exponentially, and the problem is likely to get much worse, particularly as the popularity of agentic AI grows.</p><p>As I&#8217;ve written about in my article &#8220;<strong><a href="https://www.resilientcyber.io/p/bringing-security-out-of-the-shadows">Bringing Security Out of the Shadows</a></strong>,&#8221; insecurity lives in the shadows, including AI. Rampant shadow AI usage seems pervasive, with the report finding that 98% of organizations have shadow and unsanctioned AI usage. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F8cj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 424w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 848w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 1272w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F8cj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png" width="542" height="204.78028747433265" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:368,&quot;width&quot;:974,&quot;resizeWidth&quot;:542,&quot;bytes&quot;:171436,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F8cj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 424w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 848w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 1272w, https://substackcdn.com/image/fetch/$s_!F8cj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb5f9efb-f2ec-4dc9-8e06-3e65952af896_974x368.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>This again is driven by longstanding risk-averse security cultures, where the business and developers work around rather than with us due to fears of security saying &#8220;no.&#8221; We also cannot keep pace with our business peers, who are rapid adopters and innovators of new technologies. At the same time, we remain late adopters and even laggards, driving the infinite cycle of bolted-on rather than built-in security cultures.</p><p>Rounding out the key findings, almost all organizations &#8212;99%&#8212;have sensitive data that they have dangerously exposed to AI tools. We see organizations rapidly adopting everything from LLMs to chatbots, coding assistants, and more, all haphazardly granted access to sensitive organizational data, creating cybersecurity, compliance, and reputational risks for organizations.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tav0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 424w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 848w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 1272w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tav0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png" width="624" height="146.9" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:226,&quot;width&quot;:960,&quot;resizeWidth&quot;:624,&quot;bytes&quot;:113602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tav0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 424w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 848w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 1272w, https://substackcdn.com/image/fetch/$s_!Tav0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0edc10aa-ff14-4b3f-90bc-ebcb088d54b1_960x226.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Now that we&#8217;ve discussed the key findings, let&#8217;s go a bit deeper and see how these findings culminate among enterprise organizations, including over 1,000 of which Varonis examined as part of the <a href="https://hubs.ly/Q03nrsQD0">report</a> and research process.</p><h2>Shadow AI</h2><p>Among the key findings was the rampant presence of shadow AI, that is, AI usage that is out of the purview or involvement of cybersecurity, bypassing security controls, governance, and active advocacy for secure adoption and usage. </p><p>Varonis points out that <strong>millions</strong> of users downloaded DeepSeek in 2025 alone and points to incidents such as unsecured DeepSeek databases that exposed millions of lines of log streams, including chat histories, secret keys, and other sensitive data. Governance of model usage is a real problem, especially when economic factors such as cheaper models, which are appealing from the business perspective, help drive adoption over security considerations.</p><p>The findings of the Varonis <a href="https://hubs.ly/Q03nrsQD0">report</a> really highlight this concern beyond just a specific model.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PiqS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PiqS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 424w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 848w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 1272w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PiqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png" width="582" height="296.9958791208791" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:743,&quot;width&quot;:1456,&quot;resizeWidth&quot;:582,&quot;bytes&quot;:1308410,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PiqS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 424w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 848w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 1272w, https://substackcdn.com/image/fetch/$s_!PiqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feae46329-4c71-4ee7-9f66-02fbffceac5a_1858x948.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Nearly all organizations have rampant unsanctioned AI app usage, as security can&#8217;t keep pace with the proliferation of AI applications and services that their business, development, and engineering peers are tapping into. </p><p>As the report shows, much of this is driven by SaaS governance risks, with over half of employees using high-risk OAuth apps and 25% of OAuth apps in the organizations being high-risk. </p><p>This presents not only governance and data exposure risks but also the ability for these credentials to be compromised. This could cause a chain reaction of supply chain risks across the various AI applications and services accessed with the credentials.</p><h2>Microsoft 365 Copilot Data Risks</h2><p>The next findings are risks associated with Microsoft 365 Copilot. For those unfamiliar, Microsoft 365 Copilot is embedded in core applications such as Word, Excel, PowerPoint, Outlook, Teams, and more, and can boost productivity and capability. </p><p>However, as Varonis points out, this potential force multiplier also carries security risks. The largest of these is the amount of organizational data, especially sensitive data, that Microsoft&#8217;s Copilot interfaces with, especially as organizations do a large amount of their work in the fundamental applications in which Microsoft&#8217;s 365 Copilot is natively embedded.</p><p>While some may be inclined to blow off these concerns, it wouldn&#8217;t be wise, even if it is Microsoft. It&#8217;s worth remembering that Microsoft is the leader on CISA&#8217;s Known Exploited Vulnerability (KEV) catalog, was being investigated as part of the Cyber Safety Review Board (CSRB) in 2024, and was even called a &#8220;national security threat&#8221; due to incidents involving its products by lawmakers last year.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UusQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 424w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 848w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 1272w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UusQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png" width="1456" height="438" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:438,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532167,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UusQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 424w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 848w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 1272w, https://substackcdn.com/image/fetch/$s_!UusQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd53e8c1e-0184-4965-8df4-8f7b2fad3e90_1862x560.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As you can see above, sensitive data exposure is a massive problem, impacting 90% of organizations. Tens of thousands of sensitive folders are exposed to all employees and even the open Internet. </p><p>The report points to a best practice, including one emphasized by Microsoft around Data Labeling, which helps ensure data is properly categorized, managed, and protected from AI misuse. The problem, however, is that only <em><strong>1 out of 10 companies have labeled files</strong></em>, meaning the security recommendation is falling on deaf ears.</p><h2>Salesforce Agentforce</h2><p>Following Microsoft, another industry leader, Salesforce, is highlighted in the <a href="https://hubs.ly/Q03nrsQD0">report</a>. This time it focuses on Salesforce&#8217;s offering of &#8220;Agentforce&#8221;, which is framed as the &#8220;<strong><a href="https://www.salesforce.com/agentforce/">Digital Labor Platform</a></strong>&#8221;. In Salesforce&#8217;s <strong><a href="https://www.salesforce.com/agentforce/how-it-works/">own words</a></strong> &#8220;agents can connect to <em><strong>any</strong></em> data source and use it in real time to plan, reason, and evaluate&#8221;. From a business perspective, this sounds great, but from a security perspective? </p><p>Not quite.</p><p>As Varonis lays out in the <a href="https://hubs.ly/Q03nrsQD0">report</a>, these same agents can surface unprotected sensitive data, and lead to unauthorized data access and misuse, something that has been highlighted by groups such as OWASP in their &#8220;<strong><a href="https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/">Agentic AI - Threats and Mitigations</a></strong>&#8221; publication which I had the opportunity to serve as a distinguished reviewer on. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SWsZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 424w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 848w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SWsZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png" width="212" height="282.85411140583557" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1006,&quot;width&quot;:754,&quot;resizeWidth&quot;:212,&quot;bytes&quot;:136762,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://genai.owasp.org/resource/agentic-ai-threats-and-mitigations/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SWsZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 424w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 848w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 1272w, https://substackcdn.com/image/fetch/$s_!SWsZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c19f758-b2b2-4d31-99ef-b5eb909a85c4_754x1006.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Varonis&#8217; <a href="https://hubs.ly/Q03nrsQD0">report</a> highlights just how complex and perilous our environments are getting with AI's rapid adoption and integration. For example, they found that for an SMB with 1,000 employees, over 10% of the workforce has permissions to create, grant permissions, and customize applications. Users can also create &#8220;public links&#8221;, which can be used to grant access to external AI applications, such as ChatGPT, which can then access your internal organizational data. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Sen!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 424w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 848w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 1272w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Sen!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png" width="294" height="289.9448275862069" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:580,&quot;resizeWidth&quot;:294,&quot;bytes&quot;:266432,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Sen!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 424w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 848w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 1272w, https://substackcdn.com/image/fetch/$s_!0Sen!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99ee5fdd-b1ae-4393-a805-2bb5b5121c49_580x572.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It is only a matter of time until we see these exact scenarios, a tangled web of poor access control and supply chain concerns manifesting into real-world organizational impacts and incidents. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YerF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 424w, https://substackcdn.com/image/fetch/$s_!YerF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 848w, https://substackcdn.com/image/fetch/$s_!YerF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 1272w, https://substackcdn.com/image/fetch/$s_!YerF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YerF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png" width="532" height="172.09615384615384" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:471,&quot;width&quot;:1456,&quot;resizeWidth&quot;:532,&quot;bytes&quot;:731829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YerF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 424w, https://substackcdn.com/image/fetch/$s_!YerF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 848w, https://substackcdn.com/image/fetch/$s_!YerF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 1272w, https://substackcdn.com/image/fetch/$s_!YerF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F484c1d32-cd4c-4d61-9fc8-6896d3fdb501_1862x602.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>Model Poisoning and Risks to AI Training Data</h2><p>Exposure of internal data via agents and poor access control aren&#8217;t the only concerns. Varonis rightly points out risks such as model poisoning and AI training data, which are risks also highlighted by industry leaders such as OWASP, as well as MITRE, in their MITRE <strong><a href="https://atlas.mitre.org/">Adversarial Threat Landscape for AI Systems (ATLAS)</a></strong>. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://atlas.mitre.org/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JR7n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 424w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 848w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 1272w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JR7n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png" width="383" height="197.8131868131868" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:752,&quot;width&quot;:1456,&quot;resizeWidth&quot;:383,&quot;bytes&quot;:114008,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://atlas.mitre.org/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JR7n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 424w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 848w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 1272w, https://substackcdn.com/image/fetch/$s_!JR7n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c1cf446-41c3-4a5b-859a-86075fadd26c_1484x766.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Varonis explains that with organizations curating their AI processes and products, and using data to train them, this data is at risk of breaches and attacks. This is especially true as much of the data sits across multiple cloud and IaaS environments, making managing, governing, and securing it difficult. </p><p>The findings highlight both how pervasive the risk is, as well as how poorly many organizations are doing at fundamentals such as encryption and access control, see below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c-Qu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 424w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 848w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 1272w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c-Qu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png" width="1456" height="478" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:478,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:731813,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c-Qu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 424w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 848w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 1272w, https://substackcdn.com/image/fetch/$s_!c-Qu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56e084a6-1f85-4a15-a051-26046f5385c6_1870x614.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HrmJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 424w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 848w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 1272w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HrmJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png" width="1456" height="316" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:316,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:372837,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HrmJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 424w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 848w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 1272w, https://substackcdn.com/image/fetch/$s_!HrmJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a9645bd-5fc5-4098-8ceb-4a1e9f69f9b8_1868x406.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Encrypting data can serve as a protection mechanism against model training and access by unauthorized entities. Attackers can also perform model poisoning, tampering with or corrupting training data to subsequently impact a model's performance or expose it to malicious prompts. </p><h2>Ghost Credentials</h2><p>Next among the key risks Varonis highlights is what they call &#8220;ghost users,&#8221; which are valid active accounts that belong to former employees and contractors. This demonstrates a fundamental failure of organizations to manage account lifecycles through decommissioning properly. </p><p>As the report states, despite users no longer being in the role, with the organization, or having a need to know, the accounts retain access to applications and data and can be used maliciously, often without notice, because they seem to be valid accounts. </p><p>These compromised accounts, including those belonging to agents or non-human identities (NHI), can be used to move laterally through environments, access sensitive data, escalate privileges, and more. </p><p>The problem isn&#8217;t small either. Check out the findings from Varonis below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mi3W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 424w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 848w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 1272w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mi3W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png" width="518" height="288.88461538461536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:812,&quot;width&quot;:1456,&quot;resizeWidth&quot;:518,&quot;bytes&quot;:1076916,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mi3W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 424w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 848w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 1272w, https://substackcdn.com/image/fetch/$s_!mi3W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0233f796-fa32-420c-82f5-faf0e7d0ee5a_1582x882.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the age of &#8220;zero trust&#8221;, which is built on least permissive access control, we have thousands of ghost, vacant accounts that are overly permissive and just sitting around ripe for the taking by malicious actors. </p><h2>Cloud Identities</h2><p>Building on the bane of seemingly every organization&#8217;s existence, identity, comes cloud identities, which Varonis dubs &#8220;sprawling and complex&#8221;. Varonis highlights what is often called &#8220;permission creep&#8221;, where groups and memberships aggregate over time, much like a blob. </p><p>As demonstrated in the previous section, organizations not only eliminate ghost/vacant accounts but rarely actually clean up the permissions assigned to users via groups, roles, membership, and more. </p><p>Varonis found the problem to be the most acute among non-human identities (NHI&#8217;s, such as API&#8217;s and service accounts and is understandably difficult, with the report highlighting just one CSP, AWS, has over <em><strong>18,000</strong></em> possible identity and access management permissions to manage. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oTUf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 424w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 848w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 1272w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oTUf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png" width="1456" height="287" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c12134b6-066c-45d0-8160-c18103346d9c_1874x370.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:287,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:305596,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oTUf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 424w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 848w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 1272w, https://substackcdn.com/image/fetch/$s_!oTUf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12134b6-066c-45d0-8160-c18103346d9c_1874x370.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>What&#8217;s wild is that AWS even released a native service called &#8220;<strong><a href="https://aws.amazon.com/about-aws/whats-new/2021/12/right-size-permissions-iam-access-analyzer/">IAM Access Analyzer,</a></strong>&#8221; which can be used to right-size permissions based on assigned access and actual usage. However, it seems organizations are making little to no use of this easy-to-use service that can help tighten up their permissions.</p><h2>Missing MFA</h2><p>We all know Multi-Factor Authentication (MFA) is a critical security control that must be in place, right? </p><p><em>Right? </em></p><p>Well, maybe not so, as Varonis found troubling metrics demonstrating that MFA usage was far from commonplace or standard. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://hubs.ly/Q03nrsQD0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qP44!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 424w, https://substackcdn.com/image/fetch/$s_!qP44!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 848w, https://substackcdn.com/image/fetch/$s_!qP44!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 1272w, https://substackcdn.com/image/fetch/$s_!qP44!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qP44!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png" width="1456" height="419" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:419,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:353286,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://hubs.ly/Q03nrsQD0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qP44!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 424w, https://substackcdn.com/image/fetch/$s_!qP44!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 848w, https://substackcdn.com/image/fetch/$s_!qP44!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 1272w, https://substackcdn.com/image/fetch/$s_!qP44!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa0aa09be-e989-4d3e-b7ac-faf7f7c90208_1876x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When we consider that the average organization uses <em><strong>hundreds</strong></em> of SaaS applications, the lack of MFA opens the door for credential compromise and malicious movements among SaaS applications and internal organization data, including potentially sensitive data.</p><p>It isn&#8217;t just enterprise organizations that are being targeted, either. The report highlights incidents such as Snowflake&#8217;s 2024 incident involving stolen credentials and missing MFA to access downstream customer environments in a textbook example of a software supply chain compromise.</p><h1>Closing Thoughts</h1><p>The <strong><a href="https://hubs.ly/Q03nrsQD0">Varonis 2025 State of Data Security report</a></strong> provides eye-opening insight into how problematic a lack of fundamental security controls and practices is for cloud and AI applications, services, and environments. </p><p>Among the gold rush to rapidly adopt this promising emerging technology, we can&#8217;t forget the fundamental security controls and practices we&#8217;ve learned through painful past incidents. </p><p>Varonis&#8217; report leaves us with a few key recommendations:</p><ul><li><p><strong>Reduce your blast radius</strong>: This includes managing identities throughout their entire lifecycle, and right-sizing permissions based on actual need-to-know and usage. This will be even more critical as we see the rise of Agents and Agentic AI architectures and use cases.</p></li><li><p><strong>Data security is AI security</strong>: Varonis highlights that data powers AI, whether it's the data the model is training on, organizational data the models and agents are interfacing with to drive business outcomes, or other data. This means organizations <em><strong>must</strong></em> have a comprehensive approach to data security to enable secure AI adoption.</p></li><li><p>Use AI for good: Aligning with something I have been emphasizing to my security peers, Varonis states t hat AI is a powerful tool, not just for the business or attackers, but also for defenders, when it comes to enabling automation, labeling data, responding to incidents, addressing vulnerabilities, identifying malicious behavior and more. This is a critical point that I tried to hammer home in my own article &#8220;<strong><a href="https://www.resilientcyber.io/p/securitys-ai-driven-dilemma">Security&#8217;s AI-Driven Dilemma</a></strong>&#8221;, where I stated security <em><strong>must</strong></em> be an early adopter and innovator with AI, to avoid perpetuating the bolted-on, rather than built-in security paradigm we all know so painfully well.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o5Gx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o5Gx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 424w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 848w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 1272w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o5Gx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png" width="1456" height="704" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:704,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:615839,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/164000968?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o5Gx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 424w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 848w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 1272w, https://substackcdn.com/image/fetch/$s_!o5Gx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b3d3a5-cc61-4a1c-b6a8-c14bf96b82dc_2014x974.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Be sure to check out the <strong><a href="https://hubs.ly/Q03nrsQD0">FULL REPORT</a></strong> from Varonis, as well as some additional resources below:</p></li><li><p><strong><a href="https://www.varonis.com/blog/deepseek">DeepSeek Risks and Concerns</a></strong></p></li><li><p><strong><a href="https://www.varonis.com/blog/snowflake-investigation">Snowflake Incident Investigation</a></strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p><br></p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[Resilient Cyber Newsletter #47]]></title><description><![CDATA[Layoffs & Workforce Woes, AI Congressional Testimony, Vulnerable MCP Project, The State of DevSecOps in the DoD & the Software Security Code of Practice]]></description><link>https://www.resilientcyber.io/p/resilient-cyber-newsletter-47</link><guid isPermaLink="false">https://www.resilientcyber.io/p/resilient-cyber-newsletter-47</guid><dc:creator><![CDATA[Chris Hughes]]></dc:creator><pubDate>Thu, 15 May 2025 13:11:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ynLS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Welcome!</h1><p>Welcome to issue #47 of the Resilient Cyber Newsletter.</p><p>Despite heading into summer, things are still quite hectic and exciting, with major congressional testimonies on AI, massive workforce disruption due to layoffs (and potentially AI), valuable AI security and AppSec insights, and more.</p><p>With that said, let&#8217;s dive in, as I look forward to sharing all the resources this week!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ynLS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ynLS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 424w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 848w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 1272w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ynLS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png" width="537" height="393.89835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1068,&quot;width&quot;:1456,&quot;resizeWidth&quot;:537,&quot;bytes&quot;:2623085,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ynLS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 424w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 848w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 1272w, https://substackcdn.com/image/fetch/$s_!ynLS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66c8f951-c2fb-4656-a01c-0c22b7d6bf96_1598x1172.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><strong>Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 45,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain, and more for Cybersecurity.</strong></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p><em><strong>Interested in sponsoring an issue of Resilient Cyber?</strong></em></p><p><em><strong>This includes reaching over 45,000 subscribers, ranging from Developers, Engineers, Architects, CISO&#8217;s/Security Leaders and Business Executives</strong></em></p><p><em><strong>Reach out below!</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;mailto:sponsorships@resilientcyber.io&quot;,&quot;text&quot;:&quot;-> Contact Us! <-&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="mailto:sponsorships@resilientcyber.io"><span>-&gt; Contact Us! &lt;-</span></a></p><div><hr></div><blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wRBp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wRBp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 424w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 848w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 1272w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wRBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png" width="242" height="131.48666666666668" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:163,&quot;width&quot;:300,&quot;resizeWidth&quot;:242,&quot;bytes&quot;:23313,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c297ea6-0ed5-4c89-8e90-e08f8aaefa73_300x300.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wRBp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 424w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 848w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 1272w, https://substackcdn.com/image/fetch/$s_!wRBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3257e4f4-b5c8-4420-bf2d-65ef8c71627a_300x163.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Ship Code, Not Privacy Risks</h3><p>When PII leaks into logs&#8212;a clear violation of GDPR and CCPA&#8212;relying on DLP is reactive, unreliable, and slow. Teams often spend weeks scrubbing logs, assessing exposure across tools that ingested them, and patching code after the fact.</p><p>HoundDog.ai flips the model by analyzing code early to catch unintentional developer mistakes&#8212;like overlogging or oversharing sensitive data&#8212;before it reaches production. That&#8217;s why leading enterprises trust us to drive proactive data minimization, especially in AI applications, which introduce more risky mediums than traditional apps&#8212;like prompt logs, temp files, and cached inputs.</p><p>Privacy shouldn&#8217;t be an afterthought. HoundDog.ai&#8217;s privacy-by-design code scanner integrates across all stages of development, from IDE to CI, with in-PR fix suggestions developers actually use.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://email.hounddog.ai/b?y=49q24eh2cop34o9oc4s3aoj669hj4e1lc4q6cob274r6ad366or3ge9g70h2o8ji48t24q3keho76ehf5tk6utbechi6uppec5kiu8g=&quot;,&quot;text&quot;:&quot;&#128073; Try our free privacy code scanner&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://email.hounddog.ai/b?y=49q24eh2cop34o9oc4s3aoj669hj4e1lc4q6cob274r6ad366or3ge9g70h2o8ji48t24q3keho76ehf5tk6utbechi6uppec5kiu8g="><span>&#128073; Try our free privacy code scanner</span></a></p></blockquote><div><hr></div><h1>Cyber Leadership &amp; Market Dynamics</h1><h3><a href="https://www.linkedin.com/posts/gergelyorosz_seen-the-graph-on-the-left-posted-lots-of-activity-7326934846247743488-C6K-?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">AI&#8217;s Impact on Software Engineering Hiring (or Not)</a></h3><p>A chart began to make rounds recently, highlighting what was claimed to be an incredibly sharp dip in software engineering hiring by top US AI companies, see below. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QXhh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QXhh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 424w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 848w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 1272w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QXhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png" width="514" height="361.867816091954" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:980,&quot;width&quot;:1392,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:649393,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QXhh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 424w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 848w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 1272w, https://substackcdn.com/image/fetch/$s_!QXhh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9669dd89-9fe7-4bef-a285-08e7da8d2fa8_1392x980.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The chart initially seemed to be credible, but began to face valid criticisms and analysis by folks such as <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Gergely Orosz&quot;,&quot;id&quot;:30107029,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F802a32bb-2048-428b-bdb5-d6acd1e2b2d5_48x48.png&quot;,&quot;uuid&quot;:&quot;9dac3ad4-8ec9-49bf-a6da-0125e8a53c28&quot;}" data-component-name="MentionToDOM"></span>. The chart originally seemed to be from an article by &#8220;<strong><a href="https://zekidata.com/the-us-to-become-a-net-exporter-of-ai-talent-in-2025/">zekidata</a></strong>&#8221;. Gergely points out that this is tied much more to the change from zero interest rates than it is from the rise of AI and LLMs, and even showed that there is a <em><strong>rise</strong></em> in hiring within tech jobs, including startups, unicorns, and public tech companies, from a dip seen during 2022-2023. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YZXq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YZXq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 424w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 848w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 1272w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YZXq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png" width="502" height="340.64285714285717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:988,&quot;width&quot;:1456,&quot;resizeWidth&quot;:502,&quot;bytes&quot;:742746,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YZXq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 424w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 848w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 1272w, https://substackcdn.com/image/fetch/$s_!YZXq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2192e78a-2ede-4fe9-bdfd-cafecc0c6f3e_1824x1238.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While I agree with his analysis, I do think we are seeing some major tectonic shifts occurring in the software engineering space with the rise of AI-driven development. As I&#8217;ve written in articles such as &#8220;Security&#8217;s AI-Driven Dilemma,&#8221; I suspect we will see major shifts needed within the security industry to improve effectiveness and align with this new LLM-based model of development as well. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UYKz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UYKz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 424w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 848w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 1272w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UYKz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png" width="554" height="284.2293956043956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:747,&quot;width&quot;:1456,&quot;resizeWidth&quot;:554,&quot;bytes&quot;:597790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UYKz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 424w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 848w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 1272w, https://substackcdn.com/image/fetch/$s_!UYKz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cd66d38-14a1-4257-8fb1-6e178f7f73ca_2050x1052.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my opinion, cybersecurity's future effectiveness will depend on whether it remains a laggard of emerging technologies like it has in the past or reverses across the chasm and becomes an early adopter and innovator ourselves, much like our development and business peers when it comes to AI.</p><h3><a href="https://www.cnbc.com/2025/05/07/crowdstrike-announces-5percent-job-cuts-says-ai-reshaping-every-industry.html">Crowdstrike Layoffs Rattle Cyber Industry</a></h3><p>Following the above discussion about a sharp drop in software engineering hiring, Crowdstrike recently announced plans to lay off 500 employees, or 5% of its existing workforce. </p><p>The layoffs have to some extent been attributed to AI, with this CNBC article quoting Crowdstrike CEO, George Kurtz, who said:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sboF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sboF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 424w, https://substackcdn.com/image/fetch/$s_!sboF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 848w, https://substackcdn.com/image/fetch/$s_!sboF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 1272w, https://substackcdn.com/image/fetch/$s_!sboF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sboF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png" width="536" height="208.2185128983308" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:1318,&quot;resizeWidth&quot;:536,&quot;bytes&quot;:117510,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sboF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 424w, https://substackcdn.com/image/fetch/$s_!sboF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 848w, https://substackcdn.com/image/fetch/$s_!sboF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 1272w, https://substackcdn.com/image/fetch/$s_!sboF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9236909a-6a9c-46f8-a8ce-782a8751ad2b_1318x512.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The article also discusses Crowdstrike&#8217;s growth ambitions, aiming for $10 billion in annualized revenue. Despite emphasizing AI, the article cites layoffs elsewhere, potentially due to economic and market uncertainty, such as at Autodesk, HP, and others. </p><p>Ironically enough, news broke that Klarna and others who heavily pivoted to AI and let go of teams in various functions are now walking that back and re-hiring staff after challenges with prioritizing their use of AI too heavily in place of human expertise and labor.</p><h3><a href="https://www.fastcompany.com/91333700/microsoft-linkedin-layoffs-tech-giant-cutting-6000-jobs-today">Microsoft Lays Off 6,000/3% of Workforce</a>.</h3><p>Building on the above workforce discussions, Microsoft recently announced that it was reducing its workforce by 6,000, or 3% of its overall workforce. This came just a few weeks after Microsoft's earnings announcement, which beat first-quarter earnings expectations, driven by Azure cloud growth. This also comes after Microsoft announced significant AI investments.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!s4Fj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!s4Fj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 424w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 848w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 1272w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!s4Fj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png" width="560" height="161.15384615384616" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:419,&quot;width&quot;:1456,&quot;resizeWidth&quot;:560,&quot;bytes&quot;:138102,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!s4Fj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 424w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 848w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 1272w, https://substackcdn.com/image/fetch/$s_!s4Fj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e1f61fb-b16f-4a97-a960-cf76ded6e175_1764x508.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The article notes similar cuts at Amazon, Meta and Salesforce, including a 5% cut at Meta in February.</p><h3><a href="https://www.linkedin.com/posts/siddhanttrivedi_ransomware-it-resilience-activity-7328064006022201344-txJ0?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">Ransomware Attack Wipes Out $1.7 Billion in Market Value</a></h3><p>A ransomware attack on Marks &amp; Spencer, a large British retailer, starting around easter by the DragonForce ransomware group has led to a massive financial impact. The organization is estimated to lose ~$19M <em><strong>per week</strong></em> in profit due to being unable to process online orders or track store inventory.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1dan!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1dan!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 424w, https://substackcdn.com/image/fetch/$s_!1dan!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 848w, https://substackcdn.com/image/fetch/$s_!1dan!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 1272w, https://substackcdn.com/image/fetch/$s_!1dan!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1dan!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png" width="1456" height="685" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:685,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:547590,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1dan!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 424w, https://substackcdn.com/image/fetch/$s_!1dan!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 848w, https://substackcdn.com/image/fetch/$s_!1dan!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 1272w, https://substackcdn.com/image/fetch/$s_!1dan!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5c754117-8765-4906-973e-a1885f54b6bc_1836x864.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>AI</h1><h3><a href="https://www.youtube.com/live/jOqTg1W_F5Q?si=9ZS7z5BhOWnR-6IU">AI Superiority is Economic and National Security</a></h3><div id="youtube2-jOqTg1W_F5Q" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;jOqTg1W_F5Q&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/jOqTg1W_F5Q?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I often use my spare time on weekends to catch up on long-form educational, informative, and insightful content. This committee on commerce, science &amp; transportation has it all. It features Sam Altman of <strong><a href="https://www.linkedin.com/company/openai/">OpenAI</a></strong>, Dr. Lisa Su of <strong><a href="https://www.linkedin.com/company/amd/">AMD</a></strong>. <strong><a href="https://www.linkedin.com/in/michael-intrator-2383aa57/">Michael Intrator</a></strong> of <strong><a href="https://www.linkedin.com/company/coreweave/">CoreWeave</a></strong> and <strong><a href="https://www.linkedin.com/in/bradsmi/">Brad Smith</a></strong> of <strong><a href="https://www.linkedin.com/company/microsoft/">Microsoft</a></strong><br><br>It involves a wide-ranging conversation on:</p><ul><li><p>The intersection of AI and Economic and National Prosperity and Security, including our race against China, most specifically</p></li><li><p>The need for robust, diverse energy sources to power not just AI but our future society</p></li><li><p>The need for rigorous testing and standards balanced with the need for speed and innovation, and notably, NOT following the example of the EU</p></li><li><p>Everything from protecting children to developing local and regional economies, data center developments, workforce education and stability, and much more.</p></li><li><p>It even has collaborative, productive, bipartisan discussions and subtle shots at differences in political ideologies and legislative policies.<br><br>Suppose you're passionate about technology, cybersecurity, economics, politics, and the future implications for the U.S. and the world. In that case, this is an excellent discussion to invest the time to listen to.</p></li></ul><h3><a href="https://www.microsoft.com/en-us/security/blog/2025/04/24/new-whitepaper-outlines-the-taxonomy-of-failure-modes-in-ai-agents/">Microsoft Outlines a Taxonomy of Failure Modes in AI Agents</a></h3><p>Microsoft recently released a comprehensive paper outlining AI agents' potential failure models. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!umuP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!umuP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 424w, https://substackcdn.com/image/fetch/$s_!umuP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 848w, https://substackcdn.com/image/fetch/$s_!umuP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 1272w, https://substackcdn.com/image/fetch/$s_!umuP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!umuP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png" width="260" height="235.37720706260032" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1128,&quot;width&quot;:1246,&quot;resizeWidth&quot;:260,&quot;bytes&quot;:86632,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!umuP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 424w, https://substackcdn.com/image/fetch/$s_!umuP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 848w, https://substackcdn.com/image/fetch/$s_!umuP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 1272w, https://substackcdn.com/image/fetch/$s_!umuP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F127e4a35-e2c4-45d2-bd36-ee614e380688_1246x1128.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>It covers key topics such as:</p><ul><li><p>Potential Failure Models: what their effects may be, mitigations, design considerations, and limitations</p></li><li><p>Case Studies, such as memory poisoning attacks on an agentic AI email assistant</p></li><li><p>Novel security and safety failure modes, as well as those that already exist now</p></li></ul><h3><a href="https://mofsafety.substack.com/p/agentic-disruption">Agentic Disruption: Innovator&#8217;s Dilemma As Applied to Agentic Adoption</a></h3><p>We continue to see a lot of excitement with Agentic AI, including in cybersecurity niches such as SecOps, AppSec and GRC. SOC automation in particular seems to be a key focus use case. This piece from <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Margin of safety&quot;,&quot;id&quot;:2469842,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0664789b-88ea-4c32-9e6a-da1450f8e016_1020x1173.jpeg&quot;,&quot;uuid&quot;:&quot;f4125877-2574-456e-b257-51b1a2dae6d1&quot;}" data-component-name="MentionToDOM"></span> discusses agentic adoption from the perspective of the innovator&#8217;s dilemma. </p><p>This includes the fact that SOC automation startups alone have raised $150M in the last 12 months, let alone some of the established SOC/SIEM players and their investments around AI and automation. They discuss agentic disruption from a bottom-up perspective, including customer segments and task complexity. This includes SMBs vs Large Enterprises, as well as less critical vs. more complex tasks, as seen below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-FV4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-FV4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 424w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 848w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 1272w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-FV4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png" width="484" height="303.49725274725273" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:913,&quot;width&quot;:1456,&quot;resizeWidth&quot;:484,&quot;bytes&quot;:1128259,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-FV4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 424w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 848w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 1272w, https://substackcdn.com/image/fetch/$s_!-FV4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F839f601c-34a7-4fe7-8a6d-642018836686_1764x1106.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The authors make the case that we&#8217;re likely to see earlier adoption in SMBs of agentic use cases, given their lack of expertise and workforce constraints, as well as earlier adoption of agentic implementation tied to less critical tasks, rather than complex ones. </p><p>They list the three characteristics of tasks ripe for agentic AI as:</p><ul><li><p>Highly observable, often due to a digital substrate (e.g., things that are clear and able to be tracked)</p></li><li><p>Well-defined, quantitative success metrics</p></li><li><p>High data volumes, especially for repeated tasks</p></li></ul><p>While these are valid points and I suspect they will prove true in some cases, I also suspect we may see some large enterprises being early adopters of agentic use cases due to their vast amounts of data, more robust budgets, being targeted more by VC backed AI startups looking to drive ROI and find early product market fit (PMF) and more.</p><p>We&#8217;ve seen many times that cyber vendors are disproportionately focused on the haves, rather than the have-nots (e.g., enterprises rather than SMBs) when it comes to target customers, often due to budgets. </p><p>This is why my colleagues and I have written and discussed concepts such as the cybersecurity poverty line, which most SMBs live below.</p><h3><a href="https://www.linkedin.com/pulse/a2a-mcp-blueprint-next-gen-critical-infrastructure-attacks-rob-t-lee-uiktf/?trackingId=O1LUzwpMoDOfojKg7BkD1Q%3D%3D">A2A + MCP: A Blueprint for Next-Gen Critical Infrastructure Attacks?</a></h3><p>We&#8217;ve heard quite a bit about A2A and MCP, and I&#8217;ve covered them in various articles. That said, could they be part of next-gen attacks on critical infrastructure? That&#8217;s the case SANS&#8217; Rob T. Lee makes in an article. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ivl_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ivl_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 424w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 848w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 1272w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ivl_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png" width="449" height="252.5203007518797" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:748,&quot;width&quot;:1330,&quot;resizeWidth&quot;:449,&quot;bytes&quot;:172615,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ivl_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 424w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 848w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 1272w, https://substackcdn.com/image/fetch/$s_!Ivl_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8bbea47-553b-4c8b-add5-6cfb79f7d126_1330x748.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Rob discusses the potential for A2A and MCP to facilitate ongoing persistent access, lateral movement, and other activities in critical infrastructure environments.</p><h3><a href="https://vulnerablemcp.info/">The Vulnerable MCP Project</a></h3><p>In the past couple of months, we've heard much excitement and concern about the Model Context Protocol (MCP). MCP is poised to facilitate the rise of agentic AI architectures and autonomous workflows among agents. <br><br>It also comes with potential pitfalls, including an expanded attack surface, exploitation, lateral movement, and authorization gaps. This "Vulnerable MCP" project from <strong><a href="https://www.linkedin.com/in/vineethsai/">Vineeth Sai Narajala</a></strong> is an awesome resource for learning more. <br><br>It includes:<br><br>&#128218; A comprehensive deep dive of MCP with technical insights and education<br>&#9989; An MCP "Implementer's Checklist" for quick vulnerability and risk assessments<br>&#128215; Expanded documentation of known vulnerabilities and associated mitigation strategies.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mE3-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mE3-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 424w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 848w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 1272w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mE3-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png" width="545" height="452.91895604395603" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1210,&quot;width&quot;:1456,&quot;resizeWidth&quot;:545,&quot;bytes&quot;:516954,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mE3-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 424w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 848w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 1272w, https://substackcdn.com/image/fetch/$s_!mE3-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fccbaea5d-7cc0-44ac-b2b8-fb98b3fd11d0_2154x1790.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/11/25/ai-under-the-microscope-whats-changed-in-the-owasp-top-10-for-llms-2025">OWASP Top 10 for LLM Applications 2025: Key Changes in AI Security</a></h3><p>I&#8217;ve previously shared the OWASP Top 10 for LLMs. However, this is a good blog from Saeed Abbasi of Qualys that dives into some key aspects of the OWASP LLM Top 10.</p><p>This includes:</p><ul><li><p>Key updates in 2025</p></li><li><p>Recent vulnerability entries</p></li><li><p>Revised and expanded AI Security Risks in OWASP 2025</p></li><li><p>How Qualys addresses AI security (it&#8217;s always helpful to hear how different vendors are approaching the problem).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I1to!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I1to!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 424w, https://substackcdn.com/image/fetch/$s_!I1to!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 848w, https://substackcdn.com/image/fetch/$s_!I1to!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 1272w, https://substackcdn.com/image/fetch/$s_!I1to!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I1to!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png" width="468" height="319.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:994,&quot;width&quot;:1456,&quot;resizeWidth&quot;:468,&quot;bytes&quot;:832920,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!I1to!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 424w, https://substackcdn.com/image/fetch/$s_!I1to!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 848w, https://substackcdn.com/image/fetch/$s_!I1to!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 1272w, https://substackcdn.com/image/fetch/$s_!I1to!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F641c4071-1691-4709-8d6c-6d1737023359_2244x1532.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p></li></ul><h3><a href="https://www.resilientcyber.io/p/orchestrating-agentic-ai-securely">Orchestrating Agentic AI Securely</a></h3><p>We continue to see much excitement about Agents and Agentic AI. That said, this emerging technology requires sound security principles and threat modeling.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YI1I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YI1I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 424w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 848w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 1272w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YI1I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png" width="345" height="354.349593495935" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:758,&quot;width&quot;:738,&quot;resizeWidth&quot;:345,&quot;bytes&quot;:1275542,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YI1I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 424w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 848w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 1272w, https://substackcdn.com/image/fetch/$s_!YI1I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F173d39b5-dcdf-4691-81b9-3b7e64c55798_738x758.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In my latest article, I examine the new threat modeling framework, Multi-Agent Environment, Security, Threat, Risk, and Outcome (MAESTRO). It was created by <strong><a href="https://www.linkedin.com/in/kenhuang8/">Ken Huang, CISSP</a></strong>, and covers seven key aspects of agentic AI systems:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QBDv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QBDv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 424w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 848w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 1272w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QBDv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png" width="504" height="264.2330097087379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:756,&quot;width&quot;:1442,&quot;resizeWidth&quot;:504,&quot;bytes&quot;:386082,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QBDv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 424w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 848w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 1272w, https://substackcdn.com/image/fetch/$s_!QBDv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c2590f-6ee2-4bfd-a18c-cb7123bdb180_1442x756.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#129521; Foundation models, including those consumed by model providers, as well as open source models from popular platforms such as <strong><a href="https://www.linkedin.com/company/huggingface/">Hugging Face</a></strong>, where I cite the AI Security Shared Responsibility Model, from my friend <strong><a href="https://www.linkedin.com/in/mikeprivette/">Mike Privette</a></strong></p><p><br>0&#65039;&#8419; 1&#65039;&#8419; Data Operations, including threats such as data poisoning, exfiltration, tampering, and model inversion/extraction, which OpenAI claimed China's DeepSeek did</p><p><br>&#128376;&#65039; Agent Frameworks, with examples such as Microsoft's AutoGen, LangChain, CrewAI, and LlamaIndex, where risks such as compromised model frameworks, backdoor attacks, framework evasion, and more can occur.</p><p><br>&#9729;&#65039; Deployment and Infrastructure is key, which should be very familiar to those with experience in securing cloud environments, Kubernetes, Containers, and fundamentals such as CSPM, IaC, and secure containers with runtime visibility.</p><p><br>&#128270; Evaluation and Observability: With agents poised to exponentially outnumber their human counterparts, monitoring these agents, including the processes they're involved in, the data they interact with, and potential anomalous behaviors, will be crucial. </p><p><br>&#127963;&#65039; Security and Compliance, which Frank argues cuts across the other six pillars of the framework, from models to hosting environments and application workloads.</p><p><br>&#129302; The Agent Ecosystem itself, where we will likely see marketplaces of agents, and their implications, involved in activities from business applications, customer service platforms, and enterprise automation solutions.<br><br>Overall, MAESTRO is a great tool to be added to the toolbox of security practitioners when it comes to agentic AI and securing the forthcoming wave of this new technology.</p><h1>AppSec, Vulnerability Management, and Supply Chain Security</h1><h3><a href="https://insights.sei.cmu.edu/news/sei-study-on-defense-department-devsecops-finds-excellence-and-opportunities/">The State of DevSecOps in the DoD</a></h3><p><strong><a href="https://www.linkedin.com/company/software-engineering-institute/">Software Engineering Institute | Carnegie Mellon University</a></strong> recently released a comprehensive study of DevSecOps across the U.S. Department of Defense (DoD).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KxBL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KxBL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 424w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 848w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 1272w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KxBL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png" width="352" height="399.8327526132404" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1304,&quot;width&quot;:1148,&quot;resizeWidth&quot;:352,&quot;bytes&quot;:310851,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KxBL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 424w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 848w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 1272w, https://substackcdn.com/image/fetch/$s_!KxBL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb51ce74f-d060-46b6-b853-e1b9f6b6f0a3_1148x1304.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><br>It provides a lot of great insights on the state of both DevSecOps and Software Development across the Department, including:</p><ul><li><p>The role of DevSecOps when it comes to the DoD's digital modernization efforts and future mission success</p></li><li><p>The continuiously evolving Software Factory (SWF) ecosystem across the DoD and its role as a digital arsenal for modern warfare</p></li><li><p>Improvements in the Software Factory ecosystem, such as inventory, automation, and managing the overall SWF portfolio of the DoD</p></li><li><p>How DevSecOps supports the shift to Continuous ATO (cATO) and modern compliance processes and engineering to keep pace with the state of modern software development<br><br>And much more. <br><br>This is an informative read as someone who's supported various DoD software factories and has be &#8220;DevSecOps" in the DoD and Federal government for quite some time.</p></li></ul><h3><a href="https://www.linkedin.com/posts/patrickmgarrity_cybersecurity-infosecurity-vulnerabilitymanagement-activity-7327712939258318849-tHTv?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAkEoGoBGB4OpNzHyIfoIEcGQ8FKwlE1C6k">What is Behind the Exponential Growth of CVEs?</a></h3><p>You&#8217;ve likely seen many folks discussing the exponential growth of CVEs, but what drives this growth? My friend and Vulnerability Researcher, Patrick Garrity, sheds light on that in a recent post he made.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1hxW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1hxW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 424w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 848w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 1272w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1hxW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png" width="1456" height="824" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:824,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:535707,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1hxW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 424w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 848w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 1272w, https://substackcdn.com/image/fetch/$s_!1hxW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2913bfa4-afc5-4183-ac42-f41bebf88026_1826x1034.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As Patrick points out, from 2023 to 2024, most growth can be attributed to just six CVE Numbering Authorities (CNAs). He states that five of the six are researchers or bug bounty CNAs making significant contributions to CVEs. </p><p>A fair amount is tied to WordPress, or specific open-source databases and ecosystems such as GitHub and VulnDB. </p><h3><a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">ASPM &#8217;verse Virtual Conference</a></h3><p>You&#8217;ve likely heard of &#8220;<em>Application Security Posture Management (ASPM)</em>&#8221;. If not, you can check out my article with Francis Odum titled &#8220;<strong><a href="https://www.resilientcyber.io/p/the-rise-of-application-security">The Rise of Application Security Posture Management (ASPM) Platforms</a></strong>&#8221;. </p><p>The AppSec space continues to become more complex, from vulnerability management and prioritization to tooling. Throw AI into the mix, and it is poised for some fundamental transformations in how we approach AppSec.</p><p>That is why I am excited to share that I am joining Cycode for their ASPM &#8217;verse event, I&#8217;ll be speaking in a fireside chat on:<br><br><strong> &#8220;<a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">The Future of Application Security: 3 Ways Agentic AI is Changing Security in 2025</a>&#8221; &#128272;&#129302;</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AGe7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 424w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 848w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1272w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png" width="334" height="324.135989010989" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1413,&quot;width&quot;:1456,&quot;resizeWidth&quot;:334,&quot;bytes&quot;:1338142,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AGe7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 424w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 848w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1272w, https://substackcdn.com/image/fetch/$s_!AGe7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1a10fc-6bf5-460c-a87d-bca847cbe1cd_1482x1438.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ll dig into:<br> &#9989; How AI is reshaping modern AppSec strategies<br> &#9989; Defending against evolving vulnerabilities and supply chain threats<br> &#9989; Transforming your security posture to meet the pace of innovation<br><br>&#128467; June 4, 2025<br> &#128346; 11AM ET | 8AM PT<br> &#128187; Virtual &amp; FREE to attend!<br><br>Join me and other AppSec leaders as we explore what&#8217;s next for security in the age of AI - with this <strong><a href="https://cycode.com/aspm-verse/?utm_source=speaker&amp;utm_medium=speaker&amp;utm_campaign=chrishughes">LINK</a></strong>. </p><h3><a href="https://www.linkedin.com/pulse/software-security-code-practice-teeth-just-talk-david-archer-5yghe/">Software Security Code of Practice - Teeth or Just Talk?</a></h3><p>The UK&#8217;s National Cyber Security Centre recently released a &#8220;Software Security Code of Practice&#8221;. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4Sk5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4Sk5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 424w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 848w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 1272w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4Sk5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png" width="552" height="306.3296703296703" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:552,&quot;bytes&quot;:1246676,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.resilientcyber.io/i/163406350?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4Sk5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 424w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 848w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 1272w, https://substackcdn.com/image/fetch/$s_!4Sk5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a4cc241-bbb3-4500-8a03-daa49bbc168f_1482x822.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>David Archer of Endor Labs breaks down the publication in an excellent article looking at what it gets right, where it can be improved, and whether or not it will have an impact. </p><p>David lays out the four themes of the Code of Practice: </p><p><strong>Theme 1: Secure design and development</strong></p><p><strong>Theme 2: Build environment security</strong></p><p><strong>Theme 3: Secure deployment and maintenance</strong></p><p><strong>Theme 4: Communication with customers</strong></p><p>He also walks through the principles within each theme, and where they can make an impact and be improved. While I haven&#8217;t read the Code of Practice, it looks well thought out and well-intentioned.</p><p>However, I come to the same conclusion as David. Much like CISA&#8217;s Secure-by-Design efforts (which the Code of Practice recommends vendors embrace), given that they are also voluntary, they are unlikely to see widespread adoption and even less actual implementation.</p><p>This is because the market failure of cybersecurity will not resolve itself voluntarily. It is much easier for vendors to pass the costs of insecurity onto downstream customers and consumers and continue to prioritize speed to market and revenue over security. </p><p>This won&#8217;t change until widespread consumer changes in spending patterns (unlikely) or massive regulatory changes requiring this sort of effort (also unlikely, at least in the U.S. in the current administration). Additionally, regulation can have unintended consequences and impacts, such as stifling innovation and impacting economic prosperity, so we have to pick our poison.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.resilientcyber.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.resilientcyber.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item></channel></rss>