Welcome to the Vigilant Violet blog!
Here you will find a wealth of information, inspiration, education, and actionable insights to help you take the next step in your information security career.
Identity Is the New Perimeter. We're Not Securing It Like One.
We designed access controls around human users. Then came service accounts, API keys, OAuth tokens, CI/CD pipeline credentials, AI agents with standing permissions to read your email and write to your systems. Suddenly you have an enormous non-human identity surface that's under-governed, over-privileged, and in most organizations — nobody's actually accountable for it. Identity is the new perimeter. We're not securing it like one.
Stop Managing "Resources”. How to Start Leading Humans
Math being math, the impact of a teacher is amplified and grows broadly. Teachers influence nations, change music, discover planets, and move economies.
Noise Reduction: How to make Vulnerability Management a Real Threat Awareness Tool
Drowning in scanner alerts? You're not managing risk—you're babysitting noise.
Vulnerability scanners are just the start. Real security means going beyond alerts to validate what’s actually exploitable. Inspired by a sharp piece from Picus Security, this post dives into why CVSS scores and endless CVEs don’t tell the full story—and how exposure validation can turn chaos into clarity. Ready to shift from noise to nuance? Let’s go.
Diversity: Leadership Lessons from Norwegian Disaster Movies
When I find myself defaulting to my “American” viewpoint and problem-solving, I stop. I ask myself, “How would I approach this problem from a different cultural mindset”? And if I find myself short of an answer, I know to ask those in the region.