Featured Blog
Claude Code Leak: What Security Leaders Need to Know About AI Coding Agents
Anthropic accidentally exposed the source code for its Claude Code CLI and while no customer data or model weights were involved, the impacts are more significant than most people realize. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down what actually leaked, why the agent layer matters, and what security leaders should do right now. […]
Breaches, Cyberattacks
After the Ransom was Paid: The Groundbreaking Events following the Colonial Pipeline Ransomware Attack
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
Top 3 Reasons Third-Party Vendor Risk Management is Not Easy
Cybersecurity, Cybersecurity Planning
Six Cybersecurity Best Practices That Fit Almost Any Organization’s Budget
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
The Other Side of Supply Chain Security: Tips for Organizations Being Assessed by Enterprise Clients
Cybersecurity Planning, News, Policy Development
5 Rules to Live by For Strong Cybersecurity Policy Development
Pen Testing, Web application security