SEVN-X Blog

I N S I D E   T H E   P E R I M E T E R  

 

 

 

Latest Stories

Security Tools Are Not a Security Program
Security Tools Are Not a Security Program

Author: Matt Wilson TL;DR Buying security tools doesn’t make you secure. Tools support a security program, but they don’...

Dec 3, 2025 12:16:05 AM
Security Fatigue is Real: How to Fight It
Security Fatigue is Real: How to Fight It

Author: Matt Wilson Introduction People aren’t the weakest link, they’re the most fatigued one. Between endless alerts, ...

Nov 2, 2025 6:24:09 PM
Ghost Tapping
Ghost Tapping

Matt Barnett sits down with NBC10 to talk about "ghost tapping," a new scam targeting those using contactless payment wh...

Oct 28, 2025 10:47:43 AM
Security Starts Here: Foundational Controls Every Organization Needs
Security Starts Here: Foundational Controls Every Organization Needs

AuthorS: ERIC BUCK | RYAN BRADBURY Introduction Security doesn't begin with advanced threat hunting or sophisticated pen...

Aug 29, 2025 3:29:43 PM
Beyond the Click: Why Phishing Defense Needs More Than Awareness Training
Beyond the Click: Why Phishing Defense Needs More Than Awareness Training

AUTHOR: SIARHEI STARASVETSKI Let's face it — phishing is still the go-to method for breaking into companies. Depending o...

Aug 1, 2025 1:19:42 PM
What Makes a 'Good' Security Vendor?
What Makes a 'Good' Security Vendor?

AUTHOR: MATT WILSON Whether you’re a small business working through a client security requirement or an IT leader trying...

Jul 1, 2025 9:26:53 AM
Your First Security Assessment: What to Expect
Your First Security Assessment: What to Expect

AUTHOR: MATT WILSON It's time for your first (or first in some time) security assessment…so what exactly happens?  First...

Jun 3, 2025 2:55:57 PM
Phishing: Not Just a User Problem
Phishing: Not Just a User Problem

AUTHOR: MATT WILSON Yes, users click things, they always have, and (probably, maybe) always will. However, approaching p...

Apr 29, 2025 2:37:11 PM
Password Spraying Optimization
Password Spraying Optimization

AUTHOR: SIARHEI STARASVETSKI Introduction Password spraying has long been a staple technique in penetration testing and ...

Mar 19, 2025 10:00:00 AM
PCI Compliance Cheat Code
PCI Compliance Cheat Code

Author: Steve Foret The complexity of achieving and remaining compliant against a very articulated security framework is...

Mar 10, 2025 9:15:00 AM

In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.

This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.

This is where observation turns into understanding.