Article for EdTech by Wylie Wong “Without observability, organizations don’t know what their applications, systems or cloud services are doing or how they’re performing, so…
BrainBlog for Teleport by Jason Bloomberg In my last article for Teleport, I discussed the problem of fragmented identities – how the scattershot assignment of…
An Intellyx Brain Candy Update When we last covered WitnessAI in November 2024, the AI governance market was just ramping up as enterprises struggled to…
An Intellyx Brain Candy Brief Tauth leverages the content provenance and authentication specification from the Coalition for Content Provenance and Authenticity (C2PA) to provide a…
An Intellyx Brain Candy Brief Squalify leverages a massive volume of cyber risk data from its parent company Munich Re to provide CISOs with a…
An Intellyx Brain Candy Update When we last covered Congruity360 in November 2024, the company offered lifecycle management for unstructured data with a three-phase classification…
An Intellyx Brain Candy Brief Observability telemetry, including logs, traces, metrics, and events, comes in a mishmash of different proprietary, verbose formats. The open source…
An Intellyx Brain Candy Update The technology world may have entirely transformed since we last covered Next Pathway in November 2020, but the company’s offering…
An Intellyx Brain Candy Brief The vendors of publicly available ‘frontier’ large language models (LLMs) train them to be general purpose. As a result, they…
Zero Trust for Workloads: The Foundation for Stopping Advanced Threats “Lateral movement and outbound exfiltration are the most dangerous tools in any attacker’s toolbox,” said…


