SEVN-X Blog
I N S I D E T H E P E R I M E T E R
Latest Stories
PCI Compliance Cheat Code
Author: Steve Foret The complexity of achieving and remaining compliant against a very articulated security framework is...
Securing the Supply Chain
How Far Can We Integrate Security into Software Development Author: Steve Foret “We calculated a supply chain interconne...
NIST Cybersecurity Framework 2.0: Protect
Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 6 Today, we dive into the third sub-function o...
NIST Cybersecurity Framework 2.0: What’s New?
Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...
In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.
This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.
This is where observation turns into understanding.