Blog

50 Results / Page 2 of 6

Background
Cybersecurity Trends for 2026: Why resilience beats technology alone.

todayDecember 9, 2025

close

Blog Jonathan Kimmitt

Cybersecurity Trends for 2026: Why Resilience Beats Technology Alone

If 2025 exposed anything, it’s that attackers are scaling faster than organizations are adapting. The lesson heading into 2026 is clear: resilience is now the true differentiator. Technology alone won’t bridge the gap. Compliance alone won’t close it. What organizations choose to prioritize in 2026 will determine whether they stay ahead ...

Cybersecurity 2025 Year in Review

todayNovember 27, 2025

close

Blog Jonathan Kimmitt

2025 Cybersecurity Year in Review: Key Insights from a CISO on Major Security Trends and Headlines

Why 2025 Was a Turning Point for Cybersecurity Looking back at 2025, the headlines were relentless: airports disrupted, Fortune 500 companies scrambling, supply-chain breaches rippling across industries, and lawmakers debating how much regulation is “too much.” But when you step back and study the year’s biggest stories collectively, a clearer ...

Delaying Security? Here Are the Conversations Your Organization Is Accidentally Having With Attackers.

todayNovember 20, 2025

close

Blog Jonathan Kimmitt

Delaying Security? Here Are the Conversations Your Organization Is Accidentally Having With Attackers

Every organization has reasons – sometimes practical, sometimes emotional – for delaying security investments. Budgets, convenience, and growth priorities often take center stage, while security gets pushed to “later.” But attackers don’t operate on your timeline. They don’t wait, negotiate, or care about internal challenges. In fact, the very excuses businesses use ...

2025 Hacker's Gift Guide

todayOctober 29, 2025

close

Blog Valiant Puck

Hack the Halls! It’s our 2025 Hacker’s Holiday Gift Guide

Ho Ho Holy Hackers, Batman! Enter our White Hat Wonderland as we check out some of 2025’s hottest gifts for the hacker or cybersecurity pro in your life. That’s right… Welcome to the 2025 Hacker Christmas Gift Guide, where boring socks and fruitcakes go to die. This is the ultimate list ...

Reduce false positives in your SOC

todayOctober 9, 2025

close

Blog Andrew Hickman

From Alert Overload to Actionable Insights: Conquering False Positives in Your SOC

In the fast-paced world of cybersecurity, security operations centers (SOCs) are the frontline defenders against an ever-evolving threat landscape. Picture this: It’s 2 a.m., and your SOC analyst is staring at a screen flooded with alerts, hundreds, maybe thousands, pinging in relentlessly. Malware detections, suspicious logins, anomalous network traffic. But ...

todaySeptember 18, 2025

close

Blog Alias

Beyond the Ban List – A Framework for Third-Party App Risk

As of September 2025, TikTok remains in legal limbo in the United States. A framework deal is reportedly in progress that would transfer TikTok’s U.S. operations to a consortium of American investors, including Oracle and Silver Lake. While this may preserve the app’s availability, it underscores a deeper shift in ...

Fear of Hacking at DEF CON Vegas Part 2

todayAugust 27, 2025

close

Blog Valiant Puck

Fear of Hacking at DEF CON Vegas: Part 2

Editor’s note: Following is part two of Valiant Puck’s report from DEF CON 33. As said last week, it is based off of real events, but elements may be exaggerated or even fictionalized. It’s up to you, the reader, to decide for yourself what is real and what is not. ...

Fear of Hacking at DEF CON Las Vegas

todayAugust 20, 2025

close

Blog Valiant Puck

Fear of Hacking at DEF CON Vegas: Part 1

The Signal and the Sand: My Mythic Descent into the World’s Largest Hacker Conference. The following is based off of real events, but elements may be exaggerated or even fictionalized. Editor’s note: It’s been one week since Valiant Puck returned from his assignment in Las Vegas. This blog was supposed ...