Adam Groenhout

Home Blog Contact
  • AI Bends the Vulnerability Curve

    Feb 14, 2026

  • Review: CSA's CBRA for AI Systems

    Dec 23, 2025

  • The SaaS Security Controls Profile (SSCP)

    Dec 1, 2025

  • From Ceremony to Habit: Continuous Threat Modeling with the CLI and AI

    Oct 11, 2025

  • The Security Policy as Code Framework Model

    Aug 23, 2025

  • Organizational Security Policy as Code

    Aug 11, 2025

  • Productivity is Your New Insider Threat

    Jul 20, 2025

  • Scheduling CTI: Automating Cyber Threat Intelligence with AI

    Jun 30, 2025

  • What Over How: From Process Design to Goal Definition with AI Agents

    May 31, 2025

  • AI and Threat Modeling: Augmentation, Not Automation (Yet)

    May 8, 2025

  • The Shrinking Moat: Examining Job Security in the Age of AI

    Mar 15, 2025

  • AI Security Policy: Exploring Threats to Workforce AI Tools and Building Policy

    Feb 9, 2025

  • The Security Program Why: Fundamentals for Enabling Success

    Dec 29, 2024

  • Fortifying Flavors: A Comparison of Security Programs and the Path to Maturity

    Dec 7, 2024

  • AI in the Enterprise: Building a Checklist for AI Adoption

    Oct 12, 2024

  • Job Description to Done: Developing an AI Prompt for Making Prompts

    Sep 20, 2024

  • Collect and Conquer: Security Question Frameworks for Onboarding

    Aug 24, 2024

  • A Review of the CSA Top Threats to Cloud Computing 2024

    Aug 7, 2024

  • Phasing Out: How AI will Reduce the Need for Security Architects and Reshape Everything

    Jul 30, 2024

  • Overcoming Security Architecture Challenges: The Promise of AI

    Jun 27, 2024

© 2026 Adam Groenhout. All rights reserved.