Advertisement · 728 × 90

Posts by Jack Poller

Cyber regulation isn't a technical discipline anymore — it's an extension of geopolitics. @NCCGroupplc's Global Cyber Policy Radar maps what that means for your board, your AI stack, and your supply chain. My take: securityboulevard.co...

3 days ago 0 0 0 0

Finding bugs was never the hard part. Anthropic's Project Glasswing will surface vulnerabilities faster than any tool in history. The remediation queue is already overflowing. This is a faster way to drown. #cybersecurity #AI securityboulevard.co...

1 week ago 0 0 0 0

96% of ransomware attacks target your backups first. If your immutability setting can be disabled, it's not immutable—it's theatrical. New post on what absolute immutability actually requires.

paradigmtechnica.com...

1 week ago 1 0 0 0

Your AI agents have God Mode access to sensitive data. No governance. No audit trail. No undo button.
Veeam at #TFDxRSAC is building exactly that — and it's more urgent than most security teams realize.

🔗 paradigmtechnica.com...

1 week ago 0 0 0 0

Your private cloud delivers compute, storage & networking—but developers are still waiting weeks for a database. VCF 9's DBaaS finally fixes the provisioning bottleneck that's been undermining private cloud ROI for years.

paradigmtechnica.com...

1 week ago 0 0 0 0
Preview
The Web Is Full of Traps — and AI Agents Walk Right into Them The enterprise is deploying AI agents at a pace that has outrun every security framework written to govern them. These agents don’t just answer questions

Google DeepMind just named a threat class attackers are already exploiting: AI Agent Traps.

86% commandeer rates. 93% mobile attack success.

Your agents are reading the web — and the web is ready for them.

1 week ago 0 0 0 0
Preview
Standardize or Suffer: The JCHK Blueprint for MSSPs Defending SMB and SME Clients Advanced persistent threats don't discriminate by organization size — they discriminate by defense capability. Nation-state actors and their proxies

The Pentagon's new Joint Cyber Hunt Kit is a standardized SOC in a suitcase. SMBs can't afford a 24/7 SOC. MSSPs serve dozens of wildly different environments. The JCHK blueprint solves both problems. Here's the lesson the commercial sector needs to learn.

1 week ago 0 0 0 0
Advertisement

Anthropic leaked 512K lines of Claude Code source.

🚫Insider threat tools missed it.
🚫DLP missed it.
🚫AppSec missed it.

That's not an Anthropic failure — that's a security industry failure. My latest:

paradigmtechnica.com...

1 week ago 3 0 1 0

Your printers are Linux servers with open ports, stored credentials & no owner. 56% of orgs had a print-related breach. @SymphionSecure is fixing that. New #RSAC2026 spotlight: paradigmtechnica.com...

1 week ago 0 0 0 0

Attackers don't break in — they log in. 57% of cyberattacks start with compromised identity.

At #RSAC2026, Commvault showed why identity resilience isn't optional — and why ResOps changes everything.

🔗 paradigmtechnica.com...

#cybersecurity #NHI #identity #TFDxRSAC #TFDxRSAC2026

1 week ago 0 0 0 0

96% of ransomware attacks target your backups first. If your immutability setting can be disabled, it's not immutable—it's theatrical. New post on what absolute immutability actually requires.

paradigmtechnica.com...

2 weeks ago 0 0 0 0

Your AI agents have God Mode access to sensitive data. No governance. No audit trail. No undo button.
Veeam at #TFDxRSAC is building exactly that — and it's more urgent than most security teams realize.

🔗 paradigmtechnica.com...

2 weeks ago 4 0 0 0

Your private cloud delivers compute, storage & networking—but developers are still waiting weeks for a database. VCF 9's DBaaS finally fixes the provisioning bottleneck that's been undermining private cloud ROI for years.

paradigmtechnica.com...

2 weeks ago 0 0 0 0
Preview
Standardize or Suffer: The JCHK Blueprint for MSSPs Defending SMB and SME Clients Advanced persistent threats don't discriminate by organization size — they discriminate by defense capability. Nation-state actors and their proxies

The Pentagon's new Joint Cyber Hunt Kit is a standardized SOC in a suitcase. SMBs can't afford a 24/7 SOC. MSSPs serve dozens of wildly different environments. The JCHK blueprint solves both problems. Here's the lesson the commercial sector needs to learn.

2 weeks ago 0 0 0 0

Data gravity isn't slowing your AI strategy—it's strangling it. Fragmented silos, legacy storage, and GPU clusters starving for data are costing you real money. Audi breaks the chain.

paradigmtechnica.com...

2 weeks ago 1 0 0 0
Advertisement

Anthropic leaked 512K lines of Claude Code source.

🚫Insider threat tools missed it.
🚫DLP missed it.
🚫AppSec missed it.

That's not an Anthropic failure — that's a security industry failure. My latest:

paradigmtechnica.com...

2 weeks ago 2 0 0 0
Preview
Your Next Employee Might Not Exist: LexisNexis Report Exposes the Synthetic Identity Explosion The cybercrime landscape has always rewarded speed — smash-and-grab credential theft, rapid account takeovers, opportunistic phishing. But the LexisNexis

Synthetic identity fraud jumped 8x in one year. Your next hire might not exist.

The @LexisNexis 2026 Cybercrime Report exposes the explosion — and the North Korean IT worker playbook behind it.

2 weeks ago 1 0 0 0
Preview
The White House Got the Cyber Strategy Right — By Knowing What Not to Do Analysis of the Trump administration’s concise 2024 cybersecurity strategy arguing for policy-led government, private-sector implementation, deregulation to spur innovation, and elevation of AI security as a national priority.

The White House cyber strategy is 7 pages. Critics call it thin. They're measuring the wrong thing. Policy is Washington's job. Implementation belongs to the private sector — where the real expertise lives. My take:

1 month ago 1 0 0 0
Preview
Meta's AI Safety Chief Couldn't Stop Her Own Agent. What Makes You Think You Can Stop Yours? Two incidents from the last two weeks of February need to be read together, because separately they look like cautionary anecdotes and together they look

Meta's AI safety chief lost control of her own agent. An AI bot attacked 6 open-source repos for 10 days undetected. Your controls were built for humans. Agents aren't human. The gap between executive confidence and actual capability is the real risk.

1 month ago 1 0 0 0
Preview
83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse Summary of Google’s H1 2026 Cloud Threat Horizons findings arguing identity failures, weaponized local AI tooling, and collapsing exploitation windows require AI-native security architectures and automated identity governance.

83% of cloud breaches start with identity. We've overprovisioned humans forever — now we've copy-pasted that problem onto NHIs and AI agents. New analysis from Google's H1 2026 Cloud Threat Horizons Report:

1 month ago 1 0 0 0
Preview
The White House Got the Cyber Strategy Right — By Knowing What Not to Do Analysis of the Trump administration’s concise 2024 cybersecurity strategy arguing for policy-led government, private-sector implementation, deregulation to spur innovation, and elevation of AI security as a national priority.

The White House cyber strategy is 7 pages. Critics call it thin. They're measuring the wrong thing. Policy is Washington's job. Implementation belongs to the private sector — where the real expertise lives. My take:

1 month ago 1 0 0 0
Preview
Meta's AI Safety Chief Couldn't Stop Her Own Agent. What Makes You Think You Can Stop Yours? Two incidents from the last two weeks of February need to be read together, because separately they look like cautionary anecdotes and together they look

Meta's AI safety chief lost control of her own agent. An AI bot attacked 6 open-source repos for 10 days undetected. Your controls were built for humans. Agents aren't human. The gap between executive confidence and actual capability is the real risk.

1 month ago 0 0 0 0

Every network has an expiration date.

AI demand and quantum computing are rewriting the rules of enterprise infrastructure—and Cisco is making a big architectural bet to stay ahead of both.

My full analysis 👇
paradigmtechnica.com...

1 month ago 0 0 0 0

Your AI cluster is only as fast as the network feeding it.

A dropped packet doesn't just cause latency — it idles thousands of GPUs simultaneously.

New analysis on why networking is now the defining variable in AI ROI: paradigmtechnica.com...

1 month ago 0 0 0 0
Preview
Anthropic Didn’t Kill Cybersecurity. It Just Reminded Us There Are Two Doors. - Security Boulevard Anthropic’s Claude Code Security sparked a sharp SaaS market selloff, but investors missed a critical reality: AI code scanning addresses only half of modern cyberattacks. Identity, credentials, and human factors remain the dominant breach vectors.

Anthropic's code scanner sent cyber stocks crashing. Okta. SailPoint. Down 9%+. For a tool that doesn't touch identity security at all. Attackers have two doors — code vulnerabilities and identity abuse. AI just slammed one of them. The other is still wide open. 🔗

1 month ago 0 0 0 0
Advertisement

OT operators bypass security tools when networks drop. Not malice — survival instinct. Xona's v5.5 just closed that gap. New analysis: paradigmtechnica.com... #OTSecurity #CriticalInfrastructure

1 month ago 0 0 0 0

Enterprises are losing the AI race not because they lack compute — but because their data is chaos. One exabyte. One rack. One open standard that changes the economics entirely.

New analysis: paradigmtechnica.com...

#AIIFD4 #AI #Storage

2 months ago 0 0 0 0
Preview
The Chicken Littles of Silicon Valley: Why AI Doomsayers Are Repeating History’s Greatest Mistake The sky has never been falling. Yet here we are again, watching a new generation of prognosticators prophecy civilizational collapse while evidence of

Every generation gets its Chicken Littles. The printing press was going to destroy society. So was the car. The computer. They were wrong every time — and the AI doomsayers are wrong now. History doesn't care about your panic.

2 months ago 0 0 0 0

Every network has an expiration date.

AI demand and quantum computing are rewriting the rules of enterprise infrastructure—and Cisco is making a big architectural bet to stay ahead of both.

My full analysis 👇
paradigmtechnica.com...

2 months ago 0 0 0 0
Preview
The Lock, Not the Alarm: How Palo Alto's Koi Acquisition Rewrites Endpoint Security The acquisition of Koi Security isn't just a product play — it's a declaration that the agentic era has created an entirely new threat surface, and the

Palo Alto just spent $400M on a 1-year-old startup — right after a $25B CyberArk deal. The reason why reveals something every CISO needs to understand about agentic security. My analysis:

2 months ago 0 0 0 0