Browse the full collection below, or use the category filters and search bar to quickly find topics that matter most to you. New content is added regularly, so check back often!
Zero Trust in Practice: Mapping NIST 800-207 to Real-World Technologies
Learn how to implement Zero Trust Architecture in practice. We map NIST 800-207 concepts—like Policy Enforcement Points (PEPs) and Policy Decision Points (PDPs)—to real-world technologies such as firewalls, identity providers, and endpoint protection platforms.
Keep readingZero Trust Architecture (NIST 800-207) Explained: Principles, Components, and Workflow
Learn what Zero Trust Architecture (ZTA) really means according to NIST 800-207. Understand its core principles, key components, and how the Policy Decision and Enforcement Points work together to secure every access request.
Keep readingWhat Is Sovereign SASE? Architecture, Benefits, and How It Works
Learn how Sovereign SASE delivers the benefits of SASE without sending traffic to the cloud. Discover its architecture, core pillars, and why data sovereignty matters for compliance and security.
Keep readingHow Photo Deepfakes Are Made with Stable Diffusion: A Complete Guide
Learn how photo deepfakes are created using Stable Diffusion. We’ll explore face swaps, custom models, LoRA training, detection techniques, and how to spot AI-generated images.
Keep readingBreaking the Kill Chain: A Defensive Approach
First developed by Lockheed Martin, the Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a successful attack. This model is made up of 7 sequential steps, including: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives To disrupt the attack, one or more of these…
Keep readingChatGPT for Offensive Security: Five Attacks
ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to understand human input, while GPT-3 uses over 175 billion data points to find a solution. This means that when a request comes in, NLP processes the input and runs it…
Keep readingUnderstanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
In May 2021, the US government signed an Executive Order mandating that software suppliers selling to the government must include a Software Bill of Material (SBOM) in their software. This move was made in response to the increasing trend of supply chain attacks, which increased by a staggering 650% from 2020 to 2021. Why Do…
Keep readingWhat is Secure Service Edge? SSE vs SASE vs VPNs
At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and more software as a service (SaaS) and cloud-based services available directly on the internet, this approach no longer makes sense for modern organizations. Today’s enterprises rely on an average of…
Keep readingWhat is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology that is replacing VPNs is Zero Trust Network Access (ZTNA). In this blog post, we’ll dive deep into ZTNA and explore the models, principles, and architectures that make it a…
Keep readingBecoming A Product Manager for Engineers
According to Glassdoor, Product Management was one of the fastest-growing and highest-paying jobs in not just tech but any profession for 2021. Any company that sells a product or service usually has a PM behind it who is responsible for the vision, strategy and implementation of features that go into their respective product. Sometimes referred to…
Keep reading



