What is a Risk Engineer?
Blog Published: 03/02/2026
I've spent my career as an elite security researcher hunting vulnerabilities. My job has always been to think like an attacker: find the gaps and exploit the loopholes. When I bring that same mindset to third-party risk, I find exactly what I expect: companies are treating their biggest atta...
CCM v4.1 Transition Timeline
Blog Published: 02/19/2026
This blog was published on February 19, 2026 with the latest information regarding the release of CCM v4.1. On January 28, CSA released version 4.1 of the Cloud Controls Matrix (CCM), succeeding CCM v4.0.13. This latest version strengthens the framework by incorporating requirements arising...
Securing the Modern Cloud: 5 Best Practices for Protecting Multi-Cloud Workloads
Blog Published: 03/02/2026
In the landscape of modern enterprise IT, cloud security posture management (CSPM) often takes center stage by focusing on the underlying multi-cloud infrastructure and detecting misconfigurations. However, infrastructure is only half of the equation. To achieve comprehensive security, organi...
Core Collapse
Blog Published: 02/26/2026
How AI is blowing cybersecurity apart, taking us back to our beginnings, and reforging our foundations. A star dies slowly. Then all at once. A star lives billions of years in tension. Thermal energy from fusion in its core pushes outward against gravity pulling inward. It burns thr...