SEVN-X Blog
I N S I D E T H E P E R I M E T E R
Latest Stories
NIST Cybersecurity Framework 2.0: What’s New?
Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...
NIST Cybersecurity Framework: What It Is, How It Works, and Whether It’s Right for You
Authors: Mark Keppler | Steve Foret Who Should Read This If you’re evaluating whether to adopt NIST CSF, just starting i...
So Many Frameworks: Which Cybersecurity Framework Should Your Organization Use?
Authors: Mark Keppler | Steve Foret Who Should Read This If you’re evaluating cybersecurity frameworks for the first tim...
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
Author: Ryan Bradbury Introduction While Hollywood would have you believe that most high-profile 'hacks' involve highly-...
Building a Password Cracker Rig
AUTHOR: VitALITY KOVALCHUK Welcome to the SEVN-X HashBurglar Tutorial. In this multi-part blog series, we will dive into...
Surprising Stats 2023
The average cost of a data breach in 2023 was $4.45 million. Every year, IBM Security releases the Cost of a Data Breach...
Prospect Health (affecting Crozer Health) Ransomware attack
The Video What Should You Do If You Were Impacted by the Breach? Several steps should be taken if you were potentially i...
Protect Yourself From Social Engineering
Introduction Social Engineering tactics are hard to counter as they are constantly evolving in their ingenuity and they ...
How To Effectively Communicate Cybersecurity To The Board
It has become increasingly important to have cybersecurity initiatives receive board recognition and CISOs must be able ...
Password Cracking 101
Who doesn't love complex passwords?... Hackers!!! Let me explain, everyone knows that passwords are the most used method...
In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.
This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.
This is where observation turns into understanding.