Cybersecurity blog

News, articles and thought leadership.

Recently published blogs

Operational Technology (OT) refers to the hardware and software that control physical systems like factory equipment, power grids, or hospital machines. Unlike IT, which focuses on data access and user services, OT is about delivering physical products and tangible services.

Attackers exploit current cryptographic vulnerabilities. Malicious actors intercept encrypted communications, store them indefinitely, and wait patiently for quantum advancements to render encryption obsolete. This might raise a natural question: why would someone care about decrypting data a decade from now?

Working in security at a cybersecurity company demands a specific mindset. Frameworks, compliance standards, regulations, and tooling all have their place, but they’re not where we begin.
cryptographic agility

Indecision is the basis of flexibility. WHAT IS CRYPTOGRAPHIC AGILITY? Cryptographic agility is the principle of designing systems in a way that allows cryptographic algorithms and protocols to be swapped out with minimal friction. Is opposite is hardcoding: rather than embedding a specific algorithm like RSA or SHA-256 deep within … Read more
Rethinking Log Management

Imagine standing in the British Library. Millions of books, no organization, no labeling—just shelves overflowing with unsorted information. Somewhere in that chaos is a clue to stop a thief, and it’s your job to find it. That’s what modern cybersecurity teams face every day.

And when you look along the way we’ve come, there are spirals of vultures wheeling. — Bruce Chatwin, The Songlines (2012) THE NEED FOR SECURITY Sometimes we need a gentle reminder of harsh realities. Security isn’t a luxury item; security is a basic precondition for survival. At the very basis … Read more
an act of war

When we think of war, most of us picture something loud and visible. Tanks rolling through fields, soldiers in uniform, fighter jets in the sky. It’s an image shaped by decades of physical conflict. And one that still holds true in many parts of the world. But today, some of … Read more

An employee asks if they can deploy their own AI agent to process internal documents. They’ve found one that runs effortlessly via a cloud service and “just needs access to the shared folder.” Sounds convenient, but what if that agent starts leaking sensitive data to third parties? What if the … Read more

Security isn’t about locking doors after intruders have come and gone. It’s about designing a world where they never get in. Imagine waking up to find someone’s broken into your house. You change the locks, install cameras, maybe even adopt a loud dog. But deep down, you know the truth: … Read more
signed, sealed, subverted.

The Trusted Signature You’re alone in a quiet gallery of the Rijksmuseum, the soft hum of security systems barely audible beneath the air conditioning. A dim spotlight falls on a delicate sketch, its ink lines sharp against aged parchment. The plaque reads: Rembrandt van Rijn, ca. 1640. Experts have certified … Read more

On May 23rd, 2025, stakeholders from various large insurers met in New York City to dicsuss how cyber insurance is evolving, and how Zero Trust is increasingly at the center of the major cyber insurance shift.

A comprehensive cybersecurity assessment is a proven method to achieve insight and overview. But how exactly does such an assessment work, and why is it vital to safeguarding your business?

The Purdue Model has long served as a foundation for securing OT environments, but its limitations in addressing modern cyber threats are evident. Zero Trust enhances OT security by enforcing strict access controls, continuous monitoring, and micro-segmentation.

Community banks play a vital role in local economies, yet they face increasing cybersecurity challenges. Unlike larger financial institutions, they often struggle with limited resources, outdated technology, and complex regulations.

Let’s clear something up right away: Zero Trust does not mean we don’t trust people. It means we don’t blindly trust the digital traffic moving through our networks. And yes, that distinction matters, a lot.

KEEP UP WITH

OUR LATEST RESEARCH

Name(Required)
Email(Required)