by Arjun Shailly | Aug 21, 2025 | Deep Dive
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now Find Threat Talks on Zero Trust step 5A: Stop Breaches—Inspect Every Event Now Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation,...
by Arjun Shailly | Aug 19, 2025 | Deep Dive
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard Find Threat Talks on From Stealth to Wipers: How Seashell Blizzard Operates They’ve been called Sandworm, APT 44, Iron Viking, and Electrum. But whatever the name, Seashell Blizzard is one of the...
by Arjun Shailly | Aug 12, 2025 | Deep Dive
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak Find Threat Talks on Signal Gate Exposed: Shadow IT’s Role in 2025’s Biggest Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed...
by Arjun Shailly | Aug 6, 2025 | Threat Talks
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web Find Threat Talks on Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web The internet has long been seen as open and borderless. But as it turns out, that idea may be decidedly...
by Arjun Shailly | Jul 15, 2025 | Deep Dive
Zero Trust Step 4B: How to Secure Admin Access Find Threat Talks on Zero Trust Step 4B: How to Secure Admin Access Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers. In part B of our deep dive into step four of Zero Trust...