Home · Resources

Research, frameworks, and field intelligence.

Threat reports, white papers, and case studies authored by the analysts and advisors who do the work — written for security executives, not the marketing funnel.

— Featured research
THREAT REPORT · 2026 · DOWNLOAD

Identity-based intrusions in the cloud era

Identity is now the primary attack surface. We break down the techniques our analysts are seeing in the field, the affiliated groups, and the controls most likely to detect them early.

Download report →
REPORT COVER

Get our research in your inbox.

Quarterly threat reports and the occasional field note. No drip campaigns.