<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Spoiledlunch</title><link>https://26ebd17c.spoiledlunch.pages.dev/</link><description>Nerdy Stuff. Tech Talk. Zero Freshness. Analysis and commentary on GRC, security, and AI.</description><generator>Hugo 0.160.1</generator><language>en-us</language><lastBuildDate>Fri, 24 Apr 2026 08:30:00 -0400</lastBuildDate><atom:link href="https://26ebd17c.spoiledlunch.pages.dev/articles/" rel="self" type="application/rss+xml"/><item><title>AI Governance Gets Real Only After Deployment</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-ai-governance-gets-real-only-after-deployment/</link><pubDate>Fri, 24 Apr 2026 08:30:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-ai-governance-gets-real-only-after-deployment/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 24, 2026 • 2 min read</p><p><strong>Topics:</strong> AI</p><p>The industry still talks about AI governance like the hardest part is agreeing on principles before launch. Recent work from NIST and OpenAI points to a different reality: the difficult part starts …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-ai-governance-gets-real-only-after-deployment/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>AI</category><category>ai governance</category><category>monitoring</category><category>nist</category><category>safety</category></item><item><title>Compliance Gets Better When Regulators Ship Tools Instead of Slogans</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-compliance-gets-better-when-regulators-ship-tools-instead-of-slogans/</link><pubDate>Fri, 24 Apr 2026 08:20:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-compliance-gets-better-when-regulators-ship-tools-instead-of-slogans/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 24, 2026 • 2 min read</p><p><strong>Topics:</strong> GRC</p><p>A lot of compliance guidance dies as slideware because it explains principles without changing the operator&rsquo;s daily work. The more interesting recent GRC signal is that standards bodies and …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-compliance-gets-better-when-regulators-ship-tools-instead-of-slogans/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>GRC</category><category>compliance</category><category>gdpr</category><category>csf 2.0</category><category>governance</category></item><item><title>Why Visibility Is Becoming a Hardware Security Problem</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/</link><pubDate>Fri, 24 Apr 2026 08:10:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 24, 2026 • 2 min read</p><p><strong>Topics:</strong> Security</p><p>Security teams still talk about hardware trust like it is a procurement checkbox, but recent NIST guidance points to a more embarrassing reality: many organizations are defending systems they cannot …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>hardware security</category><category>firmware</category><category>monitoring</category><category>nist</category></item><item><title>Why AI Governance Frameworks Are Security Theater</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-20-ai-governance-security-theater/</link><pubDate>Mon, 20 Apr 2026 09:00:00 -0700</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-20-ai-governance-security-theater/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 20, 2026 • 4 min read</p><p><strong>Topics:</strong> AI, GRC</p><p>Why AI Governance Frameworks Are Security Theater Most enterprise AI governance frameworks are elaborate exercises in checkbox compliance that miss the actual risks. They&rsquo;re designed to satisfy …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-20-ai-governance-security-theater/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>AI</category><category>GRC</category><category>governance</category><category>risk management</category><category>enterprise AI</category><category>compliance</category></item><item><title>The SOC 2 Compliance Cargo Cult</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/</link><pubDate>Sat, 18 Apr 2026 14:30:00 -0700</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 18, 2026 • 6 min read</p><p><strong>Topics:</strong> GRC, Security</p><p>The SOC 2 Compliance Cargo Cult SOC 2 compliance has become a cargo cult ritual in enterprise security. Organizations implement the ceremonial controls, follow the prescribed procedures, and wait for …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>GRC</category><category>Security</category><category>SOC 2</category><category>compliance</category><category>security controls</category><category>audit</category></item><item><title>When Zero Trust Meets Reality</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</link><pubDate>Wed, 15 Apr 2026 11:15:00 -0700</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 15, 2026 • 6 min read</p><p><strong>Topics:</strong> Security</p><p>When Zero Trust Meets Reality Zero Trust promises to solve network security by eliminating trust assumptions. The marketing pitch is compelling: assume breach, verify everything, trust nothing. In …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>zero trust</category><category>network security</category><category>architecture</category><category>implementation</category></item></channel></rss>