The Plaintext Problem: Why FTP, Telnet, and SNMP v1 Should Be Gone by Now

Plaintext protocols persist in enterprise networks because nobody prioritises replacing them until credentials leak. Here is why FTP, Telnet, and SNMP v1/v2c are still the easiest way for an attacker to harvest passwords from your wire.
April 25, 2026
Database Ports Don't Belong on the Open Network

Database ports should never be directly reachable from broad network segments, and what happens when they are ranges from data theft to full infrastructure compromise.
April 11, 2026
Can Every Pod in Your Cluster Talk to Every Other Pod?
If your Kubernetes cluster has zero NetworkPolicies, every pod can reach every other pod on every port. No restrictions. No segmentation. A flat, open network. Is that what you intended?
April 3, 2026
Does Your CI/CD Pipeline Let Build Agents Talk to Any IP on the Internet?
If your CI/CD build agents have unrestricted outbound network access, they are one compromised dependency away from exfiltrating every secret in your pipeline. Most organizations allow exactly that.
April 1, 2026
Lock Down Your Management Ports Before Ransomware Does
RDP abuse appeared in 90% of ransomware IR cases in 2023. Not phishing. Not zero-days. A firewall rule that seemed harmless six months ago.
March 28, 2026
The Trivy Breach: Why Network Egress Controls Matter More Than Ever

The Trivy supply chain compromise stole CI/CD secrets from thousands of pipelines. Organizations with default-deny egress on their build infrastructure would have stopped the exfiltration cold. Most don't have it.
March 27, 2026
Bad Firewall Requests Part 6: Tribal Knowledge Is Poisoning Your Firewall Ruleset

When there's no good reference for how to write a firewall request, people copy old tickets. The problem is those old tickets were wrong too.
March 14, 2026
Bad Firewall Requests Part 5: How Deadline Pressure Turns Firewall Rules Into Technical Debt

When vague requests meet tight timelines, firewall teams approve broader rules than they should. Those rules never get tightened. Here's how the cycle works and how to break it.
March 11, 2026
Bad Firewall Requests Part 4: Nobody Reads the Docs (and Your Firewall Pays the Price)

Vendor docs list ports for every feature the product offers. Teams that don't understand which ones they actually need just request all of them. The result is an ever-growing attack surface built on uncertainty.
March 8, 2026
Bad Firewall Requests Part 3: Your Firewall Request Form Is Setting People Up to Fail

If your firewall request form was designed by security people for security people, it might be the reason your tickets keep coming back incomplete.
March 6, 2026