<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Spoiledlunch</title><link>https://26ebd17c.spoiledlunch.pages.dev/</link><description>Nerdy Stuff. Tech Talk. Zero Freshness. Analysis and commentary on GRC, security, and AI.</description><generator>Hugo 0.160.1</generator><language>en-us</language><lastBuildDate>Fri, 24 Apr 2026 08:10:00 -0400</lastBuildDate><atom:link href="https://26ebd17c.spoiledlunch.pages.dev/topics/security/" rel="self" type="application/rss+xml"/><item><title>Why Visibility Is Becoming a Hardware Security Problem</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/</link><pubDate>Fri, 24 Apr 2026 08:10:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 24, 2026 • 2 min read</p><p><strong>Topics:</strong> Security</p><p>Security teams still talk about hardware trust like it is a procurement checkbox, but recent NIST guidance points to a more embarrassing reality: many organizations are defending systems they cannot …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-24-why-visibility-is-becoming-a-hardware-security-problem/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>hardware security</category><category>firmware</category><category>monitoring</category><category>nist</category></item><item><title>The SOC 2 Compliance Cargo Cult</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/</link><pubDate>Sat, 18 Apr 2026 14:30:00 -0700</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 18, 2026 • 6 min read</p><p><strong>Topics:</strong> GRC, Security</p><p>The SOC 2 Compliance Cargo Cult SOC 2 compliance has become a cargo cult ritual in enterprise security. Organizations implement the ceremonial controls, follow the prescribed procedures, and wait for …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-18-soc2-compliance-cargo-cult/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>GRC</category><category>Security</category><category>SOC 2</category><category>compliance</category><category>security controls</category><category>audit</category></item><item><title>When Zero Trust Meets Reality</title><link>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</link><pubDate>Wed, 15 Apr 2026 11:15:00 -0700</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 15, 2026 • 6 min read</p><p><strong>Topics:</strong> Security</p><p>When Zero Trust Meets Reality Zero Trust promises to solve network security by eliminating trust assumptions. The marketing pitch is compelling: assume breach, verify everything, trust nothing. In …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>zero trust</category><category>network security</category><category>architecture</category><category>implementation</category></item><item><title>NIST Publishes Hardware Security White Paper on Firmware-Based Monitoring</title><link>https://26ebd17c.spoiledlunch.pages.dev/news/2026-04-15-nist-publishes-hardware-security-white-paper-on-firmware-based-monitoring/</link><pubDate>Wed, 15 Apr 2026 09:00:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/news/2026-04-15-nist-publishes-hardware-security-white-paper-on-firmware-based-monitoring/</guid><description>
&lt;![CDATA[<p><strong>News Brief</strong> • April 15, 2026</p><p><strong>Topics:</strong> Security</p><p>Summary: NIST published Cybersecurity White Paper 52, &ldquo;Firmware-Based Monitoring for Bus-Based Computer Systems,&rdquo; on April 15, 2026. The …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/news/2026-04-15-nist-publishes-hardware-security-white-paper-on-firmware-based-monitoring/">Read brief →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>NIST</category><category>hardware security</category><category>firmware</category><category>forensics</category></item><item><title>NIST Finalizes Revision 3 of Its DNS Deployment Guide</title><link>https://26ebd17c.spoiledlunch.pages.dev/news/2026-03-19-nist-finalizes-revision-3-of-its-dns-deployment-guide/</link><pubDate>Thu, 19 Mar 2026 09:00:00 -0400</pubDate><guid>https://26ebd17c.spoiledlunch.pages.dev/news/2026-03-19-nist-finalizes-revision-3-of-its-dns-deployment-guide/</guid><description>
&lt;![CDATA[<p><strong>News Brief</strong> • March 19, 2026</p><p><strong>Topics:</strong> Security</p><p>Summary: NIST published the final version of SP 800-81 Revision 3, &ldquo;Secure Domain Name System (DNS) Deployment Guide,&rdquo; on March 19, 2026. …</p><p><a href="https://26ebd17c.spoiledlunch.pages.dev/news/2026-03-19-nist-finalizes-revision-3-of-its-dns-deployment-guide/">Read brief →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>NIST</category><category>DNS</category><category>DNSSEC</category><category>zero trust</category></item></channel></rss>