March 2026

Threat Intelligence

The FBI Director's Personal Email Was the Attack Surface

An Iran-linked hacking group breached FBI Director Kash Patel's personal email and published years of private correspondence. The incident exposes the structural vulnerability every senior official shares: personal communications that can be weaponized for blackmail, manipulation, or coercion live in infrastructure nobody is protecting.

Read More
March 2026

Regulatory

Bill C-26 and the New Communications Security Obligation

Canada's landmark cybersecurity legislation creates enforceable obligations for critical infrastructure operators — including requirements to secure communications systems and manage third-party risk. For organizations whose most sensitive conversations travel through foreign-jurisdiction platforms, the compliance question is also a sovereignty question.

Read More
March 2026

Threat Intelligence

Harvest Now, Decrypt Later: The Attack That Already Happened to You

Nation-state actors are not waiting for quantum computers to become publicly available. They are collecting your encrypted traffic today, storing it against a future decryption capability. This is not a theoretical future threat. It is an active, documented collection program. Here is what you need to understand about the timeline, the actors, and what it means for communications you are sending right now.

Read More
February 2026

Regulatory

NIST PQC Standards Are Final. The Clock Is Running.

In August 2024, NIST finalized the first post-quantum cryptographic standards — FIPS 203, FIPS 204, and FIPS 205. For government agencies, defense contractors, and any organization subject to federal procurement requirements, this is not guidance. Migration timelines are being set now. The organizations that begin transition today will be compliant when mandate arrives.

Read More
February 2026

Infrastructure

Who Owns the Wire Your Secrets Travel Through?

Every communication your organization sends travels through infrastructure operated by someone else. A carrier. A cloud provider. A SaaS platform's data center. In most cases, multiple of these simultaneously. The question of who has custodial access to that traffic, in what jurisdiction, under what legal framework, is the central communications security question of our era.

Read More
January 2026

Analysis

Why Signal Is Not Enough for Your Organization

Signal is a well-engineered consumer application. Its encryption is legitimate. Its open-source protocol has been peer-reviewed. But the threat model facing a government agency, a defense contractor, or a major legal institution is categorically different from what Signal was built to address. Here is exactly where the gap is — and why it matters for your organization specifically.

Read More
January 2026

Quantum Timeline

The Quantum Timeline Is Not a Prediction. It Is a Planning Horizon.

Debates about when quantum computers will break RSA-2048 miss the point entirely. Nation-state adversaries operating classified quantum programs are under no obligation to make public announcements. The question for your organization is how long your most sensitive data needs to remain confidential — and what is being collected against that timeline right now.

Read More
December 2025

Supply Chain

The Software Supply Chain Is the Communications Attack Surface

SolarWinds. XZ Utils. 3CX. The pattern is consistent: sophisticated attackers compromise the software you trust because it is more efficient than compromising your network. The 3CX attack targeted a communications platform specifically — providing access to the conversations of its users. When the tool is the weapon, your perimeter is irrelevant.

Read More

Stay Informed

Register to receive dispatches when new analysis is published.