Get a Demo
    Browse by topic
    Subscribe to our news

    Zero Trust

    When Your AI Agent Goes Rogue: The Security Gap Nobody Planned For

    Two real 2024 incidents expose the AI agent security gap most enterprises haven't closed: autonomous agents operating without enforced boundaries, inside and outside approved frameworks.
    Read

    Zero Trust

    Water OT Cybersecurity in 2026: Regulations, Threats, and a Practical Path Forward

    Water utilities have operated on voluntary cybersecurity guidance for years. That era just ended.
    Read

    The Silent Crisis in Cybersecurity: Why Secrets Management Is the New Battleground

    The most dangerous security breaches today don’t start with zero-days or nation-state sophistication. They start with something far more mundane: a leaked API key, a forgotten service account, a long-lived token that nobody remembered existed.
    Read

    Cybersecurity

    Why Healthcare Ransomware Attacks Keep Shutting Down Hospitals

    On the morning of February 19, 2026, the University of Mississippi Medical Center - Mississippi's only academic medical center - woke up to a healthcare ransomware attack that took down its Epic electronic health records system, its phone lines, and ...
    Read

    Why New OT Threat Groups Are Forcing a Reckoning With OT Network Security

    Three new adversary groups began targeting industrial control systems in 2025. That’s the headline finding from Dragos’ 9th Annual Year in Review OT/ICS Cybersecurity Report - and the details behind it should concern anyone responsible for securing ...
    Read

    News

    How Ransomware Spreads Laterally: Lessons from the SmarterTools Breach

    In late January 2026, SmarterTools confirmed that the Warlock (also known as Storm-2603) ransomware group breached its network by exploiting an unpatched SmarterMail server. According to the company's Chief Commercial Officer, the incident began on ...
    Read

    Cybersecurity

    Hardening Your DMZ Against AI-Powered and Autonomous Attacks

    For decades, the DMZ (demilitarized zone) has been treated as a reliable buffer between the internet and “trusted” internal systems. Expose a limited set of services, wrap them in firewalls, monitor traffic, and assume anything that makes it past ...
    Read

    News

    When 'Keeping Them Out' Fails: Rethinking Critical Infrastructure Security After Poland

    This blog was updated on January 28, 2026 to reflect new information reported on this attack. On December 29, 2024, almost exactly ten years after Russian hackers blacked out 250,000 Ukrainians in the first-ever cyberattack to take down a power ...
    Read

    Zero Trust

    Legacy Shadows: Illuminating Zero Trust Paths for Agencies in Brownfield Battles

    How federal agencies and their contractors can achieve Zero Trust for OT without disrupting mission-critical operations A control systems engineer is handed a mandate to achieve Target Level Zero Trust across an operational technology environment ...
    Read

    Zero Trust

    BRICKSTORM Is a Wake-Up Call: Stop What You're Doing and Protect Your DMZ

    On December 4th, CISA, the NSA, and Canadian Centre for Cyber Security dropped a joint advisory that should have every IT and security leader pulling up their network diagrams. The threat? BRICKSTORM, a sophisticated backdoor attributed to PRC ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.