Search Insights

July 28 / 2025
Reading Time: 7 minutes
Top 7 Cloud Security Trends Every Business Must Know in 2025
The cloud drives innovation, but it also creates new layers of risk that most teams aren’t equipped to manage at scale.

February 16 / 2025
Reading Time: 5 minutes
IIoT and OT Cybersecurity: The Next Battleground for Cyber Adversaries
By Matt Vogt

November 4 / 2024
Reading Time: 4 minutes
Enhancing Vulnerability Management with Incenter Tag Filtering

September 18 / 2024
Reading Time: 7 minutes
Pip Dreams and Security Schemes: Chaos in your Configuration Files

February 19 / 2024
Reading Time: 5 minutes
Purple Teams - The Business Benefits of Cost-Effective Purple Penetration Testing

January 25 / 2024
Reading Time: 4 minutes
Living off the land, an introduction to blending in for red teams

January 15 / 2024
Reading Time: 5 minutes
Indicators of Compromise (IOC): Understanding, Identifying, and Utilizing Cyber Threat Indicators

October 11 / 2023
Reading Time: 6 minutes
What's Up, Doc? An OccamSec approach to the Looney Tunables Bug (CVE-2023-4911)

August 9 / 2023
Reading Time: 4 minutes
Cracked Open: Why Overlooking Lower Risk Vulnerabilities Can Backfire

August 7 / 2023
Reading Time: less than 1 minute
Security Awareness Training is Mostly Pointless: A Practitioner's Perspective

August 7 / 2023
Reading Time: 3 minutes
The Human Touch in Cybersecurity: Why AI Can't Fully Replace Penetration Testers
