Overview
Explore
Services
Experts
Events
Select a tab
77 results found
Practical Magic: Let's Build Zero Trust
How do you implement a security concept that feels like magic? The answer isn't an illusion; it's a practical craft. We're moving beyond theory to provide the blueprint: 5 concrete steps that build this powerful idea into a tangible, resilient defense for your organization.
Blog
•Oct 10, 2025
SSL Certificate Validity Changes 2025: How to Prepare Your Business Now
Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025
Check Point and the Post-Quantum Transition
Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
Wands at the Ready: Navigating Data Protection and Sovereignty
Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Scattered Spider and the Insurance Industry
Scattered Spider exploits the insurance industry's vulnerabilities through advanced social engineering, targeting legacy systems and human weaknesses. As cyber threats evolve, insurers must transition from prevention to resilience, focusing on rapid detection and response. The industry's future hinges on integrating technology, processes and human awareness to thwart these sophisticated attacks.
Blog
•Aug 31, 2025
From Games to Gains: the Role of Game Theory and Gamification in Cybersecurity Risk Management
Game theory and gamification are pivotal in cybersecurity, offering insights into attacker and defender behaviors and enhancing awareness and training. This beginner's guide will delve into using game theory for predictive analysis and gamification to bolster cybersecurity practices. Ideal for professionals, researchers and students, this post marks the beginning of a multi-part series aimed at solidifying the understanding of game theory and gamification's impact on digital security.
Blog
•Feb 29, 2024
The Grizzled CyberVet's Tactical Plan: Mapping Palo Alto Networks to MITRE ATT&CK
Next up in the Grizzled CyberVet series: A global enterprise faces a full-scale cyberattack spanning every stage of the MITRE ATT&CK framework. Armed with Palo Alto Networks' full security platform, they stop the threat at every turn. Learn how a unified security strategy can outmatch attackers before they succeed. Read on to see it in action!
Blog
•Mar 19, 2025
Innovative Regulatory Compliance Solutions for the Banking Industry
Banks must address an increasing volume of compliance directives from regulators. This blog post details WWT's multifaceted approach to mitigating regulatory risks through compliance automation, preventative risk management and continuous monitoring.
Blog
•Mar 25, 2024