Trusted Developer Tools Are Now Malware Delivery Systems: ThreatDown’s Marco Giuliani on the Deno Runtime Attack ThreatDown VP of Research Marco Giuliani breaks down the first Deno-based fileless malware attack — steganography-hidden payloads, ... By Monika Chauhan4 hours ago Security
API Attacks Surge 113% as Attackers Shift to Coordinated Multi-Vector Campaigns | Steve Winterfeld, Akamai Attackers are combining API abuse, web exploits, and DDoS into coordinated industrial-scale campaigns. Akamai's Steve Winterfeld explains ... By Monika ChauhanApril 22, 2026 Security
Why Security Standards Lag Behind Threats—And How to Stay Ahead | Steve Winterfeld, Akamai | TFiR Security standards move slower than threats. By the time OWASP or NIST publish guidance, attackers have ... By Monika ChauhanMarch 24, 2026 Security
Why Security Leaders Should Plagiarize Compliance Frameworks | Steve Winterfeld, Akamai | TFiR Security compliance doesn't have to be boring or bureaucratic. Steve Winterfeld, Advisory CISO at Akamai, explains ... By Monika ChauhanMarch 20, 2026 Security
OWASP Updated Their Top 10 Again—Here’s What Security Leaders Need to Know | Steve Winterfeld, Akamai | TFiR OWASP lists aren't static. The Web Application Top 10 added software supply chain vulnerabilities. LLMs updated after ... By Monika ChauhanMarch 13, 2026 Security
Why Static Code Scanners Fail at Runtime—And What Security Leaders Should Do | Joe Sullivan, Joe Sullivan Security | TFiR AI coding assistants are shipping code faster than ever. But static scanners can't catch what breaks in ... By Monika ChauhanMarch 13, 2026 Security
How Enterprises Stop Breaches with Automated Attack Surface Management Modern enterprises are drowning in complexity. Chris Wallis, Founder and CEO of Intruder, explains how automated attack ... By Monika ChauhanMarch 10, 2026 Security
Jeremy Allison on Why Post-Quantum Cryptography Can’t Wait | CIQ Adversaries are harvesting encrypted data today to decrypt when quantum computers arrive. Jeremy Allison of CIQ discusses ... By Monika ChauhanMarch 2, 2026 Security
Akamai’s Advisory CISO on Why OWASP’s Top 10 Lists Are a Security Team’s Best ROI Akamai's Steve Winterfeld breaks down how OWASP's Top 10 vulnerability lists help security teams maximize ROI — ... By Monika ChauhanFebruary 25, 2026 Security
The Hidden Risk of Open Source: What Happens When Maintainers Walk Away When open source maintainers walk away from mature projects, companies are left with production dependencies and no ... By Monika ChauhanFebruary 5, 2026 Cloud Native