Featured Blog
What the Nancy Guthrie Case Reveals About Cloud Providers
When the FBI announced on February 10, 2026 that it had recovered previously inaccessible video from Nancy Guthrie’s disconnected Google Nest doorbell, the technical detail that stood out wasn’t the camera model. It was the phrase the FBI used to explain where the video came from: “residual data located in backend systems.” In other words, footage many assumed was gone still existed somewhere […]
Cryptography, Quantum Computing and Cybersecurity
Quantum Computing and Cybersecurity: How to Secure the Quantum Future
Web application security
Are Your AI-Backed Web Apps Secure? Why Prompt Injection Testing Belongs in Every Web App Pen Test
cybersecurity training, Incident Response
Critical Incident Response Training: Your Top Questions Answered
Data encryption, Email Encryption
Securing the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward
Ransomware, Tabletop Exercises
How a Ransomware Tabletop Exercise Can Dramatically Reduce Your Losses If You’re Attacked
Cyberattacks, Pen Testing