SEVN-X Blog
I N S I D E T H E P E R I M E T E R
Latest Stories
PCI DSS: What It Is and What It Isn't
What PCI Isn't Let’s dig in. PCI is not easy, but it can be made significantly easier with the right configuration and t...
Stay Steps Ahead With Assumed Breach Testing
What's The Big Deal Assumed Breach Penetration Testing is intended to emulate an attacker that has already achieved a le...
To SAST, or to DAST, That is the Question
While implementing secure coding guidelines, enforcing strict code review processes, providing our developers the necess...
Deconstructing The Penetration Test
All Pen Tests are Not Created Equal As a security professional (who in full disclosure is not a penetration tester), I f...
Massive Account Takeover @Twitter
The Video What Happened? Hackers targeted Twitter to compromise some of the country’s most prominent figures including f...
Does Your Office Miss You?
The New Normal It's no surprise that we live in a digital age. Particularly in this COVID era—where the majority of the ...
The Great Security Race
Why is a comparison to other, similar organizations so sought after? Is it comforting? All too often this information is...
In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.
This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.
This is where observation turns into understanding.