If you've been in cybersecurity long enough, you develop a reflex: dramatic claims usually aren't true. So when a tweet started circulating in early April 2026 alleging 10 petabytes of data had been stolen from China's National Supercomputing Center in Tianjin—including defense documents and missile research—my reaction was the same as most practitioners: prove it. This brings us to the crucial question: did it really happen?
The 10-Petabyte Heist: The Recent China Supercomputing Breach Means
Topics: Cybersecurity, Penetration Testing, Monitoring, MXDR, Policies & Procedures, china
A CEO’s Dilemma: Balancing Growth with Cyber Resilience
As a CEO, you’re the captain of a ship, navigating the high seas toward growth and innovation. But every time you set sail toward new horizons; you’re also charting a course through shark-infested digital waters. With every new mile marker, your attack surface increases, and so does your exposure to cyber threats.
Topics: Cybersecurity, Network Security, Data Security, Data Protection, risk, Monitoring, Attack Surface Profiler
The Constant Challenge: Keeping Your External Attack Surface in the Fast Lane
In the world of IT, we’re all drivers on a high-speed track. With cloud infrastructures, remote workforces, third-party integrations, and the wild card of Shadow IT, our attack surface expands like a growing racetrack full of sharp turns and unexpected obstacles.
Topics: Cybersecurity, Network Security, Data Security, Data Protection, risk, Monitoring, Attack Surface Profiler
Now Open: The FCC’s Schools and Libraries Cybersecurity Pilot Program
The FCC’s Schools and Libraries Cybersecurity Pilot program is now open for FCC Form 484 Part 1and we’d like to take a moment to help qualifying organizationsget the most bang from their submission.
Topics: Cybersecurity, Information Security, Data Protection, Penetration Testing, Incident Response, Monitoring, MXDR
When in doubt, try "Password123" - How I guessed your password
During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.
Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring
