Familiar Implementation

Familiar Implementation

Familiar Implementation You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement. No one likes to be told that a solution to a...
I Believe Many Use the Word “Threat” Incorrectly

I Believe Many Use the Word “Threat” Incorrectly

I Believe Many Use the Word “Threat” Incorrectly I feel that too many people conflate “threat” and “vulnerability” but couldn’t quite put my finger on a clear definition. I think I now can. I was listening to the estimable John Gruber’s Talk Show podcast, episode 243...
Is There a Dog in That Picture?

Is There a Dog in That Picture?

Is There a Dog in That Picture? You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement. No one likes to be told that a solution to...
Unknown Unknowns

Unknown Unknowns

Unknown Unknowns When even a top security company needs to be told by the FBI that they’ve been hacked, you have to realize that something’s simply missing in the way everyone is approaching cyber threat visibility. The Stat It turns out that it’s not so unusual for...