top of page
All Posts


2025 Cybersecurity Year in Review
2025 was the year cybersecurity shifted from human speed to machine speed. Our definitive year-in-review recap covers the weaponization of Agentic AI, record-breaking telecom breaches, and the massive wave of vendor consolidation. We dive deep into the reality of CMMC 2.0 Phase 1 and FedRAMP automation, offering crucial predictions for the landscape in 2026.

Donnie Hasseltine
Jan 106 min read


Salt Typhoon: Technical Analysis of the Pivot from Espionage to Infrastructure Capture
Salt Typhoon has pivoted from espionage to infrastructure capture. Unlike typical threat actors, they don't just breach the network; they inhabit the router.
This technical analysis breaks down the specific tradecraft behind the recent ISP compromises—including the weaponization of Cisco Guest Shells, the use of SNMP for lateral movement, and the exfiltration of data via GRE tunnels. Read on to understand why traditional EDR misses them entirely and how to audit your network

Kedge Security Team
Jan 34 min read


False Claims Act Cybersecurity Risks: Lessons from the Hillmer Indictment
This case serves as a critical reminder that when it comes to federal cybersecurity compliance, the cover-up is often far worse than the crime.

Kedge Security Team
Dec 13, 20253 min read


The Startup Guide to CMMC
If you are a founder in the Defense Industrial Base (DIB), the "wait and see" era is officially over. As of November 10, 2025 , the Department of Defense (DoD) has begun including Cybersecurity Maturity Model Certification (CMMC) requirements in active solicitations. The final rule is effective. The phased rollout has begun. For years, CMMC was the "boogeyman" of government contracting—looming, confusing, and constantly delayed. But today, it is a binary filter: Compliant or

Kedge Security Team
Nov 25, 20256 min read


I Got My Series A, Do I Need a CISO?
The champagne has been popped, the press release is out, and the new capital is in the bank. Your Series A is closed. Now, the real pressure starts: scale. Your world is suddenly filled with enterprise sales RFPs, investor demands for governance, and a growing mountain of customer data. And with that, a new question starts to haunt your leadership meetings, usually brought up by a new board member or a massive potential customer: "Who is your CISO?" For a founder, this questi

Kedge Security Team
Nov 17, 20254 min read
bottom of page
