LATEST POSTS

Blog2024-10-01T12:34:51-04:00

Our team researches and documents bleeding-edge security concepts and hacking techniques.
This blog explores these topics and more to keep you informed.

Unsupported. Unpatched. Why does the distinction matter in software?

By |April 17, 2026|Blog|

Introduction At my previous employer, I was responsible for putting together data slides for the Cybersecurity steering committee presentation. I would end up with a lot of: Incomplete data Inconsistent data Data that wasn't telling ...

Blackboxing the Kube: Why Your Cluster is Only as Strong as Its Weakest Link (or Lack Thereof)

By |March 6, 2026|Blog|

Congratulations. You’ve successfully containerized your legacy monolith, slapped it into a Kubernetes cluster, and now you’re telling your stakeholders that you’re “cloud-native.” It’s a beautiful sentiment, really. You’ve traded the headache ...

Go to Top