Skip to content

//CYBER SECURITY, DIGITAL HEALTH, MEDICAL DEVICE AND DEFENCE SECURITY BLOG

  • There are no suggestions because the search field is empty.

Subscribe for Updates

JOIN OUR MAILING LIST FOR THE LATEST POSTS, INSIGHTS, AND CYBERSECURITY GUIDANCE.

ARCHIVE

Harrison Mussell

Is Your AI Infrastructure...

I have spent the better part of a decade in the trenches of high-stakes compliance. I have lived through the clinical ...

Project Glasswing and Claude...

Anthropic has just announced Project Glasswing, and if you work in cybersecurity, healthcare IT, or digital health, ...

The Hidden Threat — Securing...

A spacecraft launched with a compromised component cannot be recalled. The aerospace supply chain spans hundreds of ...

What Microsoft Actually Built...

On 2 April 2026, Microsoft published a blog post announcing the Agent Governance Toolkit — described as "open-source ...

Zero Trust Architecture for...

Zero Trust is not a product; it is a security philosophy: never trust, always verify. In traditional IT, Zero Trust ...

Anatomy of a Satellite Hack —...

On 24 February 2022, at the exact moment Russian forces crossed into Ukraine, a cyberattack took down tens of thousands ...

From Ground to Orbit: The...

Every spacecraft communicates with the ground via radio frequency links, TT&C (Telemetry, Tracking, and Command) ...

Why Space is the Ultimate...

The Space ISAC reported a 118% surge in space-related cyber incidents in 2025. Space is no longer a benign environment; ...