SEVN-X Blog

I N S I D E   T H E   P E R I M E T E R  

 

 

 

Latest Stories

Password Spraying Optimization
Password Spraying Optimization

AUTHOR: SIARHEI STARASVETSKI If Your Security Team Uses Password Spraying, Read This First Password spraying is one of t...

Mar 19, 2025 10:00:00 AM
PCI DSS Compliance Cheat Code
PCI DSS Compliance Cheat Code

Author: Steve Foret Who Should Read This If you’re an IT director, CISO, or compliance officer at an organization that p...

Mar 10, 2025 9:15:00 AM
Incident Response 101
Incident Response 101

What to Do When "IT" Hits the Fan Author: Matt Wilson TL;DR – When a cyber incident strikes… PANIC, wait that's not righ...

Feb 27, 2025 10:36:44 AM
Security vs. Compliance: Why Treating Them the Same Creates Real Risk
Security vs. Compliance: Why Treating Them the Same Creates Real Risk

Author: Matt Wilson Who Should Read This If you’re building a security program and wondering how compliance fits in, or ...

Jan 28, 2025 12:31:27 PM
PowerSchool Data Theft
PowerSchool Data Theft

Matt Barnett sits down with NBC10 to talk about the theft of personal information of PowerSchool’s customers, including ...

Jan 22, 2025 11:58:46 AM
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity Framework Assessments: Prioritizing Your Remediation

Cybersecurity Frameworks Series, part 11 After a cybersecurity framework assessment performed by a third-party cybersecu...

Jan 22, 2025 11:57:33 AM
Ransomware Hits Delaware Public Libraries
Ransomware Hits Delaware Public Libraries

Matt Barnett sits down with NBC10 to talk about the ransomware attack on the Delaware public library system. The Video

Jan 22, 2025 11:57:19 AM
Money Matters TV
Money Matters TV

Matt Barnett sits down with Doug Hepburn’s Money Matters TV to talk about the current trends and risks for organizations...

Jan 22, 2025 11:56:31 AM
Securing the Supply Chain
Securing the Supply Chain

How Far Can We Integrate Security into Software Development Author: Steve Foret “We calculated a supply chain interconne...

Jan 22, 2025 11:56:18 AM
NIST Cybersecurity Framework 2.0: Interpreting Your Results
NIST Cybersecurity Framework 2.0: Interpreting Your Results

Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 10 Should your organization use a recognized c...

Jan 22, 2025 11:56:11 AM

In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.

This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.

This is where observation turns into understanding.