Part 3 of Jason English’s “Life at the End of the Funnel – A Technology Bard’s Tale” After making TV commercials and award-winning CD-ROM games…
Appdome’s IDAnchor™ Gets New Risk Intelligence APIs to Power Mobile Reputation & the Enterprise AI Age “Mobile devices are more a part of daily life…
BrainBlog for Next Pathway by Jason Bloomberg In the late eighteenth century, a chess-playing automaton called the Mechanical Turk was a sensation across the courts…
Article for SiliconANGLE by Jason Bloomberg Asimov’s Three Laws of Robotics may be intentionally flawed, but they teach us important lessons about agentic artificial intelligence…
LinkedIn post by Didis Guarda I curated the top cybersecurity leaders around the world, along with my team at Citiesabc.com and Businessabc.net to outline how…
First Layer 7 solution to bring verified application identity, trusted device context, precise location, and deep session risk into API Authorization “New AI-based attack vectors…
An Intellyx Brain Candy Brief In the modern cybercrime environment you cannot simply deploy an application into production on the network without basic security controls…
An Intellyx Brain Candy Brief Authorization is essentially an unsolved problem in computing. Partial solutions exist, but it’s still not possible to define in any…
At first it was all about moving workloads to AWS. Then it was about multi-cloud deployment choices across Azure, Google Cloud, IBM, and Oracle. Then…
An Intellyx Brain Candy Brief Open source project mirrorD, developed by MetalBear, creates a virtual space within an organization’s staging environment to run locall processes…


