Security engineer. Recovering VC and academic sharing random thoughts on security. Click to read Frankly Speaking, by Frank Wang, a Substack publication with thousands of subscribers.| franklyspeaking.substack.com
Tested three approaches to automating security questionnaires with AI: expensive SaaS vendors, custom RAG solutions, and direct LLM use. Skip the vendors and try these alternatives instead.| Marco Lancini's Blog
Posted by Jeff Vander Stoep - Android team, and Alex Rebert - Security Foundations Memory safety vulnerabilities remain a pervasive threa...| Google Online Security Blog
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.| krebsonsecurity.com
Unveiling the impact: Our study delves into how data breaches influence stock market prices, revealing the financial repercussions for affected companies.| Comparitech