Insights and updates
from across the team.

Filter By:

A stylized view through a transparent laptop computer screen at digital shapes and patterns, behind which are a hand interacting with the laptop keyboard
22 May 25

How Strategic Tech Investments Cut Our Insurance Costs by a Third

In early 2025, as EPSD spun out into independent operations, we made some bold strategic technology decisions. We made initial up-front IT investments of less than 10% over “good enough” choices, and that increase delivered us a 31% insurance savings. Spending just a bit more on IT significantly raised the complexity and the cost attackers must bear to breach us, and resulted in measurable operational gains and user happiness.

Read more
An older businessman shakes the hand of a younger businesswoman to illustrate the concept of succession planning
20 May 25

Succession Planning: A Surprisingly Common Business Risk

Fast-growing companies, particularly those in technology and high-stakes industries, often prioritize immediate operational needs over long-term planning. One critical area that frequently gets overlooked is succession planning—a business continuity essential that can create serious vulnerabilities if not properly addressed.

Read more
Michael Kreil presents at 38c3 conference
13 May 25

The VW Group Data Breach is a Business Problem, not an IT Failure.

In December 2024, the Chaos Computer Club revealed that VW Group’s software unit Cariad exposed 9.5TB of sensitive data affecting 800,000 VW, Seat, Audi, and Skoda owners. The breach included personal information and location histories that, despite Cariad’s claims otherwise, were easily tied by researchers to individual customers.

Read more
Photograph of endless binders of paper reports
29 Apr 25

The Post-Mortem Dilemma: Why Companies Struggle to Learn from Incidents

Security incidents should be a catalyst for improvement, but too often, companies fail to extract meaningful lessons from them. Post-incident reviews are either rushed, incomplete, or focused on blame, leading to missed opportunities for resilience and long-term security improvements.

Read more
← Prev Next →