Cybersecurity blog

News, articles and thought leadership.

Zero Trust

Operational Technology (OT) refers to the hardware and software that control physical systems like factory equipment, power grids, or hospital machines. Unlike IT, which focuses on data access and user services, OT is about delivering physical products and tangible services.
Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
Rethinking Log Management
Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.
Zero Trust from conviction
Security isn’t about locking doors after intruders have come and gone. It’s about designing a world where they never get in. Imagine waking up to find someone’s broken into your house. You change the locks, install cameras, maybe even adopt a loud dog. But deep down, you know the truth: you acted too late. That’s … Read more
A comprehensive cybersecurity assessment is a proven method to achieve insight and overview. But how exactly does such an assessment work, and why is it vital to safeguarding your business?
The Purdue Model has long served as a foundation for securing OT environments, but its limitations in addressing modern cyber threats are evident. Zero Trust enhances OT security by enforcing strict access controls, continuous monitoring, and micro-segmentation.

Threat InTEL

Operational Technology (OT) refers to the hardware and software that control physical systems like factory equipment, power grids, or hospital machines. Unlike IT, which focuses on data access and user services, OT is about delivering physical products and tangible services.
Attackers exploit current cryptographic vulnerabilities. Malicious actors intercept encrypted communications, store them indefinitely, and wait patiently for quantum advancements to render encryption obsolete. This might raise a natural question: why would someone care about decrypting data a decade from now?
Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
Cybersecurity for AI
An employee asks if they can deploy their own AI agent to process internal documents. They’ve found one that runs effortlessly via a cloud service and “just needs access to the shared folder.” Sounds convenient, but what if that agent starts leaking sensitive data to third parties? What if the source code or the model … Read more
On May 23rd, 2025, stakeholders from various large insurers met in New York City to dicsuss how cyber insurance is evolving, and how Zero Trust is increasingly at the center of the major cyber insurance shift.
Once a primarily technical position, the role of Chief Information Security Officer (CISO) now comes with a range of new responsibilities. Executives increasingly rely on CISOs; but this can be risky.

Business & Technology

Operational Technology (OT) refers to the hardware and software that control physical systems like factory equipment, power grids, or hospital machines. Unlike IT, which focuses on data access and user services, OT is about delivering physical products and tangible services.
Attackers exploit current cryptographic vulnerabilities. Malicious actors intercept encrypted communications, store them indefinitely, and wait patiently for quantum advancements to render encryption obsolete. This might raise a natural question: why would someone care about decrypting data a decade from now?
Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
cryptographic agility
Indecision is the basis of flexibility. WHAT IS CRYPTOGRAPHIC AGILITY? Cryptographic agility is the principle of designing systems in a way that allows cryptographic algorithms and protocols to be swapped out with minimal friction. Is opposite is hardcoding: rather than embedding a specific algorithm like RSA or SHA-256 deep within your application, you externalize it, … Read more
Rethinking Log Management
Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.
Cryptography pre- and post-quantum
And when you look along the way we’ve come, there are spirals of vultures wheeling. — Bruce Chatwin, The Songlines (2012) THE NEED FOR SECURITY Sometimes we need a gentle reminder of harsh realities. Security isn’t a luxury item; security is a basic precondition for survival. At the very basis of the pyramid formed by … Read more