Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

Cyber Basics

Home as an Attack Vector: How Hackers Target Families to Compromise Companies

TL;DR — Home is the new cyber front line: Attackers increasingly target employees’ households, families, and personal devices as indirect paths...

4 min read

What is Whole-Person Security and Why It Matters for Organizations

TL;DR — Whole-Person Security Means Securing the Real Person, Not Just the Workstation Security no longer stops at the network edge—employees’...

4 min read

Securing the Loop: How to Train Oversight Humans for AI-Era Security

TL;DR — “Human-in-the-loop” only works if the human is trained for it Most “human oversight” is theater: people are asked to sign off on AI without...

5 min read

Rubber Stamp Risk: Why "Human Oversight" Can Become False Confidence

TL;DR — Human oversight isn’t automatic protection: beware the rubber-stamp trap Many organisations treat “human in the loop” as a compliance check...

3 min read

What Does "Human in the Loop" Mean in AI Security?

The New Frontier of Human Risk: Securing the AI Loop In a world where artificial intelligence is embedded into code review, customer support, cyber...

2 min read

What Your Board Isn’t Hearing About Human Risk

The National Association of Corporate Directors (NACD) now advises boards to view cyber risk as a systemic business issue, not merely a technical...

2 min read

Security Culture Is a System, Not a Vibe

It might be easy to think of culture—the way we do things around here—as a vibe. But what is a vibe, really? It's a feeling, an impression, a sense...

3 min read

Did Your Human Developers Evolve With Your New AI Tools?

The software development lifecycle is undergoing a profound transformation—one marked not by a slow evolution, but by a seismic shift in pace,...

3 min read

What is Double Extortion Ransomware?

Double extortion is an advanced ransomware tactic where attackers not only encrypt a victim's data to demand a ransom for decryption but also steal...

2 min read

a game plan drawn on chalkboard

Incident Response:How to Help Employees When Cyber Threats Strike

Imagine your organization's cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a...

3 min read