What the Field CISO Role Looks Like in Practice
Using Phil Venables' Field CISO framework as a lens to describe what the role actually looks like from inside it at Knox Systems, where the product is a FedRAMP shared boundary.
3 posts
Using Phil Venables' Field CISO framework as a lens to describe what the role actually looks like from inside it at Knox Systems, where the product is a FedRAMP shared boundary.
Anthropic just handed the entire industry a ~500,000-line lesson in why supply chain hygiene is not optional, and why being safety-obsessed at the model layer means nothing if your build process is a mess.
A Chinese state-sponsored threat actor used Anthropic's Claude to autonomously breach Mexican government systems, stealing 150GB of sensitive data including 195 million taxpayer records.