Mar 13, 2026

Cloud Misconfigurations: The #1 Cause of Breaches Nobody Wants to Admit

Cloud Misconfigurations: The #1 Cause of Breaches Nobody Wants to Admit

Cloud Misconfigurations: The #1 Cause of Breaches Nobody Wants to Admit

Cloud Misconfigurations: The #1 Cause of Breaches Nobody Wants to Admit

A grounded walkthrough of where real cloud environments fail, including identity assignments, storage exposure, monitoring gaps, and over-permissioning. The post focuses on fixes that materially reduce risk and ties technical issues directly to business impact.

A grounded walkthrough of where real cloud environments fail, including identity assignments, storage exposure, monitoring gaps, and over-permissioning. The post focuses on fixes that materially reduce risk and ties technical issues directly to business impact.

A grounded walkthrough of where real cloud environments fail, including identity assignments, storage exposure, monitoring gaps, and over-permissioning. The post focuses on fixes that materially reduce risk and ties technical issues directly to business impact.

A grounded walkthrough of where real cloud environments fail, including identity assignments, storage exposure, monitoring gaps, and over-permissioning. The post focuses on fixes that materially reduce risk and ties technical issues directly to business impact.

Mar 6, 2026

Don’t Wait Until Q4 For Your Annual Pen Test

Don’t Wait Until Q4 For Your Annual Pen Test

Don’t Wait Until Q4 For Your Annual Pen Test

Don’t Wait Until Q4 For Your Annual Pen Test

Year-end penetration tests are often driven by budgets or audits rather than risk reduction. Testing earlier in the year gives teams time to remediate findings, influence architecture decisions, and turn security testing into meaningful improvement—not just documentation.

Year-end penetration tests are often driven by budgets or audits rather than risk reduction. Testing earlier in the year gives teams time to remediate findings, influence architecture decisions, and turn security testing into meaningful improvement—not just documentation.

Year-end penetration tests are often driven by budgets or audits rather than risk reduction. Testing earlier in the year gives teams time to remediate findings, influence architecture decisions, and turn security testing into meaningful improvement—not just documentation.

Year-end penetration tests are often driven by budgets or audits rather than risk reduction. Testing earlier in the year gives teams time to remediate findings, influence architecture decisions, and turn security testing into meaningful improvement—not just documentation.

Feb 27, 2026

My Thoughts on Claude Code Security

My Thoughts on Claude Code Security

My Thoughts on Claude Code Security

My Thoughts on Claude Code Security

Michael Weimer shares his thoughts around the recent Claude Code Security hype.

Michael Weimer shares his thoughts around the recent Claude Code Security hype.

Michael Weimer shares his thoughts around the recent Claude Code Security hype.

Michael Weimer shares his thoughts around the recent Claude Code Security hype.

Feb 24, 2026

MFA Isn’t Enough: Why Identity Is Now Your Largest Attack Surface

MFA Isn’t Enough: Why Identity Is Now Your Largest Attack Surface

MFA Isn’t Enough: Why Identity Is Now Your Largest Attack Surface

MFA Isn’t Enough: Why Identity Is Now Your Largest Attack Surface

MFA helps, but identity sprawl and non human accounts now create the largest and least validated attack surface.

MFA helps, but identity sprawl and non human accounts now create the largest and least validated attack surface.

MFA helps, but identity sprawl and non human accounts now create the largest and least validated attack surface.

MFA helps, but identity sprawl and non human accounts now create the largest and least validated attack surface.

Feb 17, 2026

“We Passed Our Last Audit.” Why That Doesn't Mean Your Environment is Secure

“We Passed Our Last Audit.” Why That Doesn't Mean Your Environment is Secure

“We Passed Our Last Audit.” Why That Doesn't Mean Your Environment is Secure

“We Passed Our Last Audit.” Why That Doesn't Mean Your Environment is Secure

Passing a cybersecurity audit doesn’t mean you’re secure. Learn what audits actually measure, why security degrades afterward, and how ongoing validation closes the gaps attackers exploit.

Passing a cybersecurity audit doesn’t mean you’re secure. Learn what audits actually measure, why security degrades afterward, and how ongoing validation closes the gaps attackers exploit.

Passing a cybersecurity audit doesn’t mean you’re secure. Learn what audits actually measure, why security degrades afterward, and how ongoing validation closes the gaps attackers exploit.

Passing a cybersecurity audit doesn’t mean you’re secure. Learn what audits actually measure, why security degrades afterward, and how ongoing validation closes the gaps attackers exploit.

Jan 8, 2026

Don’t Over(React): A Measured Look at the New React / Next.js Vulnerability

Don’t Over(React): A Measured Look at the New React / Next.js Vulnerability

Don’t Over(React): A Measured Look at the New React / Next.js Vulnerability

Don’t Over(React): A Measured Look at the New React / Next.js Vulnerability

Every few months, a framework vulnerability detonates headlines and panic follows. React2Shell is the latest. It’s serious if you’re exposed, and irrelevant if you’re not. This post breaks down how to tell the difference, without fear, noise, or guesswork.

Every few months, a framework vulnerability detonates headlines and panic follows. React2Shell is the latest. It’s serious if you’re exposed, and irrelevant if you’re not. This post breaks down how to tell the difference, without fear, noise, or guesswork.

Every few months, a framework vulnerability detonates headlines and panic follows. React2Shell is the latest. It’s serious if you’re exposed, and irrelevant if you’re not. This post breaks down how to tell the difference, without fear, noise, or guesswork.

Every few months, a framework vulnerability detonates headlines and panic follows. React2Shell is the latest. It’s serious if you’re exposed, and irrelevant if you’re not. This post breaks down how to tell the difference, without fear, noise, or guesswork.