SEVN-X Blog
I N S I D E T H E P E R I M E T E R
Latest Stories
Phishing, Ransomware, Breaches: Protect Your Organization
Bad actors will always be looking for a good payday. Below are a few key things that you can do to help keep your users,...
COVID-19 Vaccine and Research Scams
The Video Vaccines are Trending November has certainly had the world in a tizzy with the US election, the surge in COVID...
So, You're Curious About ISO 27001
What is ISO 27001? ISO 27001 is a specification for an information security management system (ISMS) published by the In...
Losing Sleep Over CMMC? Read This.
CMMC Explained The “Cybersecurity Maturity Model Certification” or CMMC, will validate that contractors have adequate cy...
Source Code for Windows XP, 2003, and More Leaked
What happened? If you trust the Internet, the story goes like this: a leaker, that goes by the handle billgates3, amasse...
Building Breach Resiliency Through Collaboration
Setting the Stage With the release of the latest Verizon Data Breach Investigations Report it is encouraging to see that...
Back to [Virtual] School
The Video With the school year starting up (from home), families are facing a number of new challenges. To avoid adding ...
Text Message Scams
The Video The Newest Scam in Town Remember the saying, "There's an app for that."? Well now it seems that may apply to t...
PCI DSS: What It Is and What It Isn't
What PCI Isn't Let’s dig in. PCI is not easy, but it can be made significantly easier with the right configuration and t...
In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.
This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.
This is where observation turns into understanding.