Insights and updates
from across the team.

Filter By:

An older businessman shakes the hand of a younger businesswoman to illustrate the concept of succession planning
20 May 25

Succession Planning: A Surprisingly Common Business Risk

Fast-growing companies, particularly those in technology and high-stakes industries, often prioritize immediate operational needs over long-term planning. One critical area that frequently gets overlooked is succession planning—a business continuity essential that can create serious vulnerabilities if not properly addressed.

Read more
Brian Armstrong, the CEO of Coinbase, speaks at a conference. On May 15, 2025, Armstrong released a video in which he described how an incident happened, what Coinbase was doing about it, and that they were making victims whole, while also announcing a $20 million reward for information leading to the arrest and conviction of the perpetrators.
16 May 25

A CEO's Transparent Incident Response Communication

On May 11, Coinbase suffered a social engineering attack targeting their outsourced customer support department. Their SEC Material Cybersecurity Incident disclosure on May 15 revealed attackers obtained enough personal information to launch sucessful fake customer service attacks against Coinbase customers.

Read more
a business woman holds her head in anguish as colleagues argue in the foreground, illustrating the true cost of a cybersecurity incident
14 May 25

The True Cost of Cybersecurity Incidents

Regardless of how it happens, when your customers can’t access your service, you can’t take payments, or you can’t pay suppliers, your business stops. Full stop.

Read more
Michael Kreil presents at 38c3 conference
13 May 25

The VW Group Data Breach is a Business Problem, not an IT Failure.

In December 2024, the Chaos Computer Club revealed that VW Group’s software unit Cariad exposed 9.5TB of sensitive data affecting 800,000 VW, Seat, Audi, and Skoda owners. The breach included personal information and location histories that, despite Cariad’s claims otherwise, were easily tied by researchers to individual customers.

Read more
Is Your Incident Readiness Plan Ready?
12 May 25

Is Your Incident Readiness Plan Ready?

If your business relies on technology, security incidents are inevitable. That’s why a comprehensive, up-to-date incident readiness plan is essential. But incident response readiness isn’t something you can buy—it’s something you need to build, refine, and integrate into your organization’s culture.

Read more
Five Security Incident Readiness Steps to Take Now.
11 May 25

Five Security Incident Readiness Steps to Take Now.

Security incidents are inevitable if your organization relies on technology, people, and data. The key to minimizing their impact is having an up-to-date, well-practiced incident response plan. Here are five essential steps to ensure your organization is prepared when—not if—a security incident occurs.

Read more
business people assess graphs, illustrating the concept of measureing incident response
10 May 25

Measuring What Matters: Track Incident Response Performance and Prove ROI

Many organizations invest heavily in incident response (IR) capabilities, yet struggle to measure their effectiveness and return on investment (ROI). Without clear performance metrics, leadership lacks visibility into whether incident handling processes are improving over time or if teams are just repeating the same mistakes.

Read more
From Firefighting to Framework: Turning Incident Handling into a Strategic Advantage
9 May 25

From Firefighting to Framework: Turning Incident Handling into a Strategic Advantage

If your business relies on technology, security incidents are inevitable. And all businesses rely on technology. That’s why a comprehensive, up-to-date incident readiness plan is essential. But incident response readiness isn’t something you can buy—it’s something you need to build, refine, and integrate into your organization’s culture.

Read more
Photograph of a sign meaning 'No Speed Limit'
8 May 25

Tech Debt in Scale-Ups

When tech companies hit hypergrowth, they face the challenge of evolving their software systems from minimally viable products (MVPs) to enterprise-grade platforms. These transformations extend beyond software development to affect entire organizations.

Read more
the word security appears on a computer screen
6 May 25

Not Semantics: Why It Matters That the CrowdStrike Outage Was a Security Incident

When a faulty update to CrowdStrike’s Falcon endpoint detection and response product rendered Windows systems worldwide inoperable, it created a headline-grabbing IT outage. Airlines, hospitals, emergency services, and businesses were all affected—unable to access critical systems without complex, manual recovery efforts.

Read more
Photograph of Andes Mountains
1 May 25

Why Tech Debt Matters – And How to Pay It Off

When developers cut corners to ship products faster, they take on technical debt—a trade-off that can accelerate early growth but create long-term instability. Unlike financial debt, which can be strategic, tech debt compounds over time, leading to fragile systems, costly failures, and expensive remediation efforts.

Read more
Photograph of a pile of bills, cash, and a credit card
30 Apr 25

How Much Tech Debt is Too Much?

Tech debt is inevitable in innovation. The question isn’t whether your organization has it—but rather how well it’s managed. Proactive leaders strategically take on tech debt when necessary and implement processes to track, assess, and address it before it becomes a bottleneck.

Read more
Photograph of endless binders of paper reports
29 Apr 25

The Post-Mortem Dilemma: Why Companies Struggle to Learn from Incidents

Security incidents should be a catalyst for improvement, but too often, companies fail to extract meaningful lessons from them. Post-incident reviews are either rushed, incomplete, or focused on blame, leading to missed opportunities for resilience and long-term security improvements.

Read more
← Prev Next →