• Threat & Attack Simulation
Choosing the Right Cloud Security Assessment: A Decision Maker’s Guide
Posted by: Dave West
Read More 6 min read
  • Blog
A Practical Path to Cybersecurity Risk Quantification
Posted by: Will Klotz
Read More 3 min read
  • Blog
Crisis Action Management Planning (CAMP) for Business Resilience
Posted by: Sherri Flynn
Read More 3 min read
  • AI Security
Prompt Injection: The AI Vulnerability We Still Can’t Fix
Posted by: Sarah Kent
Read More 9 min read
  • Threat & Attack Simulation
Purple Teaming Part 2: Inside the Lifecycle, from Preparation to Protection
Posted by: Nathan Burchfield
Read More 3 min read
  • Blog
Drawing the Line: How to Define Third-Party Cyber Risk Appetite That Actually Works
Posted by: Will Klotz
Read More 3 min read
  • News
GRITREP: Observed Malicious Driver Use Associated with Akira SonicWall Campaign
Posted by: Jason Baker
Read More 3 min read
  • Application Security
The Secret Life of APIs: Uncovering Hidden Endpoints and More
Posted by: Navin Dhas
Read More 7 min read
  • Threat & Attack Simulation
Purple Teaming Part 1: The Key to Better Cybersecurity Testing
Posted by: Nathan Burchfield
Read More 3 min read
  • Blog
Why Attackers Target On-prem Active Directory
Posted by: Derek Melber
Read More 3 min read
  • News
Reflections on SciPy 2025: How Python is Shaping AI and Cybersecurity
Posted by: Keegan Justis
Read More 4 min read
  • Blog
The Strategic Power of Cyber Risk Appetite: Making Security Decisions with Clarity and Confidence
Posted by: Will Klotz
Read More 3 min read