top of page


Dec 6, 2023
Lessons from the Recent Okta Breach
The breach at Okta revealed a more significant impact than initially disclosed. Some key lessons learned.


Nov 27, 2023
Cyber Attacks on Critical Infrastructure - how bad is it?
We've dug a little deeper into the Danish CERT report on an attack against critical infrastructure. Was it really serious?

Nov 20, 2023
The Case for Identity Threat Detection and Response
While it makes sense to detect malicious activity on endpoints, there is a strong case to integrate identity into EDR strategy.


Nov 13, 2023
Who Holds the Blame for the Solarwinds hack?
Executives at organizations victims of cyberattacks are under pressure. Regulators are widely expected to charge them for cyber lapses.


Nov 6, 2023
Citrix Bleed - a new internet facing vulnerability, again
Having internet facing devices on-premise is becoming untenable and should be considered a huge risk. Better use managed service offerings.

Oct 30, 2023
Maximize EDR Capabilities with Email Telemetry Data
Surfacing email telemetry data within the XDR console can provide useful contextual info for the SOC analyst, but also actionable response.

Oct 24, 2023
Cybersecurity breaches move markets - the Okta example
A breach at Okta reveals how quickly the consequences propagate. The incentive to minimize risks is stronger than ever before.

Oct 20, 2023
The Cisco IOS XE vulnerability - regional impact
The latest Cisco IOS XE bug shows that running your own public or internet facing device looks increasingly risky and inappropriate.


Oct 11, 2023
Breach costs are mounting - a glimpse into recent attacks
The costs of data breaches and cyber attacks are becoming all too visible. Here's some recent examples from mostly U.S. based organizations.
bottom of page