An Intellyx Brain Candy Brief Airrived‘s platform creates and runs agents for security use cases such as incident response, governance, AI security, identity management, and…
An Intellyx Brain Candy Brief Tauth leverages the content provenance and authentication specification from the Coalition for Content Provenance and Authenticity (C2PA) to provide a…
An Intellyx BrainBlog by Eric Newcomer | Part 2 of the Auguria Data Experience Series Organizational Security Challenges Every large organization allocates a budget to…
An Intellyx Brain Candy Update ThreatModeler automates security architecture and compliance reviews to help development teams and business stakeholders identify and remediate potential application and…
An Intellyx Brain Candy Brief Squalify leverages a massive volume of cyber risk data from its parent company Munich Re to provide CISOs with a…
An Intellyx Brain Candy Brief Homomorphic encryption allows encrypted data to be consumed directly for analytics and processing without first having to decrypt it. Without…
An Intellyx Brain Candy Brief Skene reads from a vibe coding repository to understand the generated code for the purpose of adding product led growth…
Blog Post for Broadcom Mainframe Software by Eric Newcomer The computing landscape has broadened significantly in recent years, with many more types and styles of…
Blog Post for Broadcom Mainframe Software by Eric Newcomer Mainframes run many significant commercial applications and are a key part of strategic investments for digital…
“The plan keeps coming up again / And the plan means nothing stays the same / But the plan won’t accomplish anything / If it’s…


