Welcome to the Vigilant Violet blog!

Here you will find a wealth of information, inspiration, education, and actionable insights to help you take the next step in your information security career.

Identity Is the New Perimeter. We're Not Securing It Like One.

Identity Is the New Perimeter. We're Not Securing It Like One.

We designed access controls around human users. Then came service accounts, API keys, OAuth tokens, CI/CD pipeline credentials, AI agents with standing permissions to read your email and write to your systems. Suddenly you have an enormous non-human identity surface that's under-governed, over-privileged, and in most organizations — nobody's actually accountable for it. Identity is the new perimeter. We're not securing it like one.

Read More
Noise Reduction: How to make Vulnerability Management a Real Threat Awareness Tool
leadership, information security Jess Vachon leadership, information security Jess Vachon

Noise Reduction: How to make Vulnerability Management a Real Threat Awareness Tool

Drowning in scanner alerts? You're not managing risk—you're babysitting noise.
Vulnerability scanners are just the start. Real security means going beyond alerts to validate what’s actually exploitable. Inspired by a sharp piece from Picus Security, this post dives into why CVSS scores and endless CVEs don’t tell the full story—and how exposure validation can turn chaos into clarity. Ready to shift from noise to nuance? Let’s go.

Read More