Blog

53 Results / Page 1 of 6

Background
Why legal and HR must be involved early in incident response

todayApril 30, 2026

close

Blog Jonathan Kimmitt

Why Legal and HR Must Be Involved Early in Incident Response

Involving legal and HR in incident response is part of running the process correctly. It should never function as an optional or secondary step. Incident response is a business process, not merely a technical one. While security teams focus on containment, investigation, and recovery, legal and HR address obligations, employee ...

Ransomware kill chains are collapsing

todayApril 16, 2026

close

Blog Will Arnett

Ransomware Kill Chains Are Now Measured in Hours… Not Days

What Security Leaders Must Do Next Ransomware is no longer a slow‑burn, multi‑week operation. In April 2026, threat intelligence confirms that modern ransomware campaigns routinely progress from initial access to data encryption in hours, sometimes within a single business day. Attackers are exploiting freshly disclosed vulnerabilities before patches are widely ...

todayApril 7, 2026

close

Blog Will Arnett

Critical Infrastructure Cyber Attacks and the Changing Face of War

Modern geopolitical conflict has increasingly expanded beyond traditional battlefields – with cyber operations becoming a critical complement to conventional military force. From Kinetic Battlefields to Digital Front Lines Modern conflict is no longer confined to physical terrain. Over the last decade, cyber operations targeting critical infrastructure have moved from a theoretical risk to ...

todayMarch 28, 2026

close

Blog Andrew Peters

Why Time Is One of the Hardest Problems in Digital Forensics

In digital forensics, time is not just metadata—it is evidence. Nearly every action performed by a user or system leaves behind artifacts tied to a timestamp, and those timestamps form the foundation of forensic timeline analysis. When interpreted correctly, they reconstruct events with precision. When misunderstood, they can quietly distort ...

todayMarch 11, 2026

close

Blog Jonathan Kimmitt

When the Security Guard Leaves the Door Open: What Physical Security Teaches Us About Cybersecurity Duty of Care

The Physical Security Scenario: A Simple Analogy for Cybersecurity Negligence Imagine a simple scenario. A bank hires a security company to protect its building overnight. The guard steps outside for a smoke break and props the back door open. While he’s gone, someone walks in and steals thousands of dollars ...

AI Prompt risk

todayMarch 5, 2026

close

Blog Dylan Howard

AI Prompt Risk: The Hidden Threat Inside Business Workflows

As organizations race to integrate AI assistants and copilots into everyday work, a new class of risk is quietly taking root: AI prompt risk — the accidental exposure, manipulation, or misuse of sensitive data through the prompts employees type into AI systems. It’s not hypothetical. In enterprise environments today, risky prompts ...

todayFebruary 27, 2026

close

Blog Tanner Shinn

Why EDR Alone Can’t Stop Credentialed Attacks

EDR Is Great… But What Stops an Attacker Who Never Drops Malware? Endpoint Detection and Response (EDR) is essential in any modern Windows environment. That part isn’t up for debate. If you operate Windows endpoints at scale without EDR, you are vulnerable to commodity threats by default. But the problem ...

todayFebruary 20, 2026

close

Blog Jonathan Kimmitt

Managing Privacy Compliance Requirements for AI Implementation in Your Organization

Artificial Intelligence is entering organizations faster than privacy programs can adapt. Teams are using AI to summarize documents, analyze spreadsheets, draft communications, and automate workflows—often without realizing they are moving regulated data into systems that were never considered in the original privacy design. The issue is not that AI creates ...