top of page



How to Leverage Geopolitical Risk Intelligence in Security Planning
What Is the BGRI? The BlackRock Geopolitical Risk Indicator (BGRI) is a quantitative tool designed to measure how much geopolitical...
Keith Pachulski
May 5, 202513 min read


When the Lights Go Out: Physical Security Lessons from the Iberian Blackout
On the morning of April 28, 2025, a widespread power outage swept across Spain, Portugal, and parts of southern France, leaving tens of...
Keith Pachulski
Apr 28, 20257 min read


Targeted but Unnoticed: What Rural Water Facility Hacks Reveal About U.S. Infrastructure Vulnerabilities
What Happened in Muleshoe? Last week, municipal staff in Muleshoe, Texas—a small rural town—identified unusual activity within their...
Keith Pachulski
Apr 21, 20258 min read


Cyber Threats Behind the Headlines: Trade Tensions and the Next Wave of State-Linked Activity
This isn’t just a geopolitical headline—it’s a tactical reality. As trade tensions ramp up, the digital fallout is already hitting...
Keith Pachulski
Apr 13, 20255 min read


Announcing Jebakan v1.0.0 – A Python-Based Honeypot for Real-World Threat Intelligence
We’re excited to officially launch Jebakan v1.0.0 , a purpose-built Python honeypot framework designed to support threat intelligence...
Keith Pachulski
Apr 11, 20252 min read


A Strategic Shift in How the EU Confronts Hybrid Threats
Last week, the European Commission launched ProtectEU , a new internal security strategy built to counter hybrid threats head-on. If you...
Keith Pachulski
Apr 7, 202510 min read


When Security Research Becomes a Liability: The FBI, Academia, and a Pattern of Pressure
The security community often walks a tightrope—pushing the boundaries of knowledge to improve defense capabilities while simultaneously...
Keith Pachulski
Mar 31, 20257 min read


Introducing DumpSec-Py: The Next-Generation Windows Security Auditing Tool
We're excited to unveil DumpSec-Py, a comprehensive and modern Python-based tool designed for security professionals, system...
Keith Pachulski
Mar 31, 20251 min read


Addressing the Gaps in School Security: Enhancing Training, Standards, and Compensation
Ensuring the safety of students and staff within educational institutions is non-negotiable. Yet across the country, school security...
Keith Pachulski
Mar 24, 20257 min read


Harnessing Agentive and Generative AI in Cybersecurity Operations
The Evolution of AI in Cybersecurity Artificial Intelligence (AI) has rapidly transformed the cybersecurity landscape, introducing both...
Keith Pachulski
Feb 7, 20257 min read


Hybrid Warfare Unveiled - Russia's Kinetic and Cyber Threats to Europe
We recently returned from a series of trips to both Eastern and Western Europe, where we conducted risk and target assessments for our...
Keith Pachulski
Dec 23, 20244 min read


Malware Incident Response for Mobile Devices: Building Mobile-Specific Playbooks
With the prevalence of malware such as SmokeLoader, which continues to evolve and affect numerous platforms, organizations need an...
Keith Pachulski
Nov 11, 202410 min read


Election Day Security: Key Concerns for Individuals and Businesses
Election Day is more than just a day to exercise your right to vote. It can also bring heightened security concerns due to rising...
Keith Pachulski
Nov 5, 20245 min read


NG911 - The Next Evolution in Emergency Response
As technology evolves, so must the systems that support critical services. One of the most vital services, the 911 emergency response...
Keith Pachulski
Nov 4, 20248 min read


Securing IP-Based Surveillance Systems: The Importance of Proper Configuration, Vulnerability Management, and Risk Controls
In today’s interconnected landscape, IP-based CCTV systems serve as indispensable tools for monitoring and securing sensitive areas....
Keith Pachulski
Nov 1, 20245 min read


New Executive Order 14117: "Safeguarding Americans' Sensitive Data"
In February 2024, President Biden introduced Executive Order 14117, “Preventing Access to Americans’ Bulk Sensitive Personal Data and...
Keith Pachulski
Oct 24, 20244 min read


Understanding the Growing Threat of Automated Social Engineering Attacks and How to Defend Against Them
As artificial intelligence (AI) and machine learning (ML) evolve, cybercriminals are increasingly using these technologies to automate...
Keith Pachulski
Oct 23, 20245 min read


Understanding Push Bombing in Multi-Factor Authentication (MFA)
Push bombing is an attack method targeting Multi-Factor Authentication (MFA) systems, where attackers flood a target with rapid, repeated...
Keith Pachulski
Oct 22, 20245 min read


Why Continuous Monitoring Must Be the Backbone of Modern Security Strategies
In today’s dynamic security landscape, organizations must adopt proactive approaches to safeguard their assets, information, and...
Keith Pachulski
Oct 17, 20248 min read


New Book Release: An Introduction to Technical Testing and Vulnerability Assessments
We’re excited to announce the release of our new book, An Introduction to Technical Testing and Vulnerability Assessments , authored by...
Keith Pachulski
Oct 15, 20242 min read
bottom of page



