Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

The Shift Left of Boom: Making Cyber Threat Prevention Practical Again

The old saying "prevention is better than cure" has lost currency in today's cybersecurity industry. Instead, security teams are advised to assume that the business has been breached and focus on threat detection, investigation, response, and recovery. Yet, during cyber incident post-mortems, it is not uncommon to find that the business owned the tool that would have protected it against the breach. The problem arose because it wasn't correctly configured before the incident happened, and no one knew this - or if they did, they didn't have the time or resources to fix it.

No Time to Drift: How AI Is Changing the Way Security Teams Manage Configuration Drift

In this episode of No Time to Drift, Reach CEO Garrett Hamilton sits down with Sebastian Goodwin (Chief Trust Officer at Autodesk), John Rasmussen (Senior Analyst at TAG Infosphere, former CISO at Syneos Health), and Ed Amoroso (CEO, TAG Infosphere) to unpack one of security’s most persistent challenges — configuration drift. They explore why drift happens quietly, how it compounds into real risk, and how AI-driven automation is helping teams detect, manage, and prevent drift faster — without losing human oversight or control.

How Reach Security Works (Step-by-Step Breakdown by CRO Jared Phipps)

What does Reach actually do — and why does it matter? In this short breakdown, CRO Jared Phipps explains how Reach connects to your existing security tools — EDRs, firewalls, email gateways — to identify hidden exposures and guide real-world fixes. Reach doesn’t add another dashboard. It operationalizes the ones you already have — showing you what to fix, why it matters, and the impact each action has on risk and users.

EAP and XDR: An Essential Marriage of Proactive and Reactive Security Operations

In cybersecurity, detection and response are table stakes. Attackers are faster, techniques more subtle, and the cost of even small missteps on the part of the defender is growing. For security teams investing in Extended Detection and Response (XDR) tools like Palo Alto Networks Cortex XDR, those investments are critical—but they are not enough on their own.

Security Starts Left of Boom: Pre-Event Strategies for Proactive Risk Reduction

For years, cybersecurity has lived under a grim banner: “It’s not a matter of if you’ll be breached, but when.” That phrase became the industry’s guiding principle. Relying on prevention alone was slowly written off as impossible. Instead, the dominant wisdom declared that organizations must accept compromise as inevitable and prepare to deal with attackers after they had already gained a foothold.

Rethinking Security Posture Assessments

Security posture assessments are a foundational part of any security program. They’re how organizations take stock of their defenses, evaluate coverage, and identify gaps. But in practice, many posture assessments have become stuck in a pattern. They follow the same checklist, occur on a set routine, and result in a static document that often doesn’t translate into real change. The problem isn’t that posture assessments are irrelevant.