Cybersecurity blog

News, articles and thought leadership.

Zero Trust

Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
Rethinking Log Management
Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.
Zero Trust from conviction
Security isn’t about locking doors after intruders have come and gone. It’s about designing a world where they never get in. Imagine waking up to find someone’s broken into your house. You change the locks, install cameras, maybe even adopt a loud dog. But deep down, you know the truth: you acted too late. That’s … Read more
A comprehensive cybersecurity assessment is a proven method to achieve insight and overview. But how exactly does such an assessment work, and why is it vital to safeguarding your business?
The Purdue Model has long served as a foundation for securing OT environments, but its limitations in addressing modern cyber threats are evident. Zero Trust enhances OT security by enforcing strict access controls, continuous monitoring, and micro-segmentation.
Community banks play a vital role in local economies, yet they face increasing cybersecurity challenges. Unlike larger financial institutions, they often struggle with limited resources, outdated technology, and complex regulations.

Threat InTEL

Attackers exploit current cryptographic vulnerabilities. Malicious actors intercept encrypted communications, store them indefinitely, and wait patiently for quantum advancements to render encryption obsolete. This might raise a natural question: why would someone care about decrypting data a decade from now?
Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
Cybersecurity for AI
An employee asks if they can deploy their own AI agent to process internal documents. They’ve found one that runs effortlessly via a cloud service and “just needs access to the shared folder.” Sounds convenient, but what if that agent starts leaking sensitive data to third parties? What if the source code or the model … Read more
On May 23rd, 2025, stakeholders from various large insurers met in New York City to dicsuss how cyber insurance is evolving, and how Zero Trust is increasingly at the center of the major cyber insurance shift.
Once a primarily technical position, the role of Chief Information Security Officer (CISO) now comes with a range of new responsibilities. Executives increasingly rely on CISOs; but this can be risky.
The rapid technological advancements of the past few years (or decades, depending on how far back you want to scroll) are only picking up speed, and the threats we face will keep evolving just as fast. But what does that actually mean for 2025?

Business & Technology

Attackers exploit current cryptographic vulnerabilities. Malicious actors intercept encrypted communications, store them indefinitely, and wait patiently for quantum advancements to render encryption obsolete. This might raise a natural question: why would someone care about decrypting data a decade from now?
Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
cryptographic agility
Indecision is the basis of flexibility. WHAT IS CRYPTOGRAPHIC AGILITY? Cryptographic agility is the principle of designing systems in a way that allows cryptographic algorithms and protocols to be swapped out with minimal friction. Is opposite is hardcoding: rather than embedding a specific algorithm like RSA or SHA-256 deep within your application, you externalize it, … Read more
Rethinking Log Management
Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.
Cryptography pre- and post-quantum
And when you look along the way we’ve come, there are spirals of vultures wheeling. — Bruce Chatwin, The Songlines (2012) THE NEED FOR SECURITY Sometimes we need a gentle reminder of harsh realities. Security isn’t a luxury item; security is a basic precondition for survival. At the very basis of the pyramid formed by … Read more
an act of war
When we think of war, most of us picture something loud and visible. Tanks rolling through fields, soldiers in uniform, fighter jets in the sky. It’s an image shaped by decades of physical conflict. And one that still holds true in many parts of the world. But today, some of the most serious attacks do … Read more