🎥 Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“DevSecOps Worst Practices”
📽️ https://twp.ai/4in9of

🎥 Missed one of my past conference talks? Let’s fix that.
I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.
“DevSecOps Worst Practices”
📽️ https://twp.ai/4in9of
Catastrophic outages donât just crash systems â they expose assumptions. Related: Getting the most from cyber insurance At RSAC 2025, I met with ESET Chief Security Evangelist Tony Anscombe to trace a quiet but growing convergence: endpoint defense, cyber insurance, and monoculture risk are no longer separate concerns. Theyâre overlapping â and reshaping how security […]
I had the opportunity to sit down with former DTer, Joe Slowik at #RSAC to talk about suspicious domains.
Here are some of the key takeaways from our conversation:
🔹 Joe shared how attackers are playing the long game—like in the SolarWinds attack, where a fake AWS domain sat dormant for nearly a decade.
🔹 From aged domains to hijacked home routers, adversaries are evolving. And groups like Volt Typhoon are targeting U.S. critical infrastructure with chilling precision.
🔹 It’s time to rethink defense—beyond tools, toward resilient architecture and even manual fallbacks.
Listen to the podcast here: https://podcasts.apple.com/us/podcast/breaking-badness/id1456143419?i=1000711183082
I just published my Trip Report from an amazing week at B-Sides SF and #RSAC2025! Highlights, photos, and everything in between — check it out here:
https://twp.ai/4in5Xh
I just published my Trip Report from an amazing week at B-Sides SF and #RSAC2025! Highlights, photos, and everything in between — check it out here:
https://twp.ai/4inQiQ
Non-human service accounts have quietly become one of the biggest liabilities in enterprise security. Related: Why identity is the cornerstone of cyber defense These machine credentials â used to automate connections between systems â now outnumber humans by 30 to 1. That gap is likely even wider in cloud-intensive environments. Yet despite their scale, service […]
Executives are under digital siegeâand most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 Privacy, to unpack a trend reshaping the threat landscape: the weaponization of personal data against corporate leaders and high-net-worth individuals. For a full […]