The Project0 Blog
Practical insights from the front lines of cybersecurity. Threat intelligence, penetration testing techniques, compliance guidance, and more.
Featured Posts
Why Your Annual Pentest Isn't Enough
Annual penetration tests check a compliance box, but they leave your organization exposed for the other 364 days of the year. Here's why continuous testing is the new standard.
Mo
Founder & Principal Consultant
The Rise of AI-Powered Phishing: What You Need to Know
Generative AI has eliminated the spelling mistakes and awkward phrasing that once made phishing emails easy to spot. Here is how the threat landscape is changing and what defenders can do about it.
Mo
Founder & Principal Consultant
All Articles
Showing 8 articles
Why Your Annual Pentest Isn't Enough
Annual penetration tests check a compliance box, but they leave your organization exposed for the other 364 days of the year. Here's why con...
Mo
Founder & Principal Consultant
Mar 10, 2026
5 min read
Building a SOC from Scratch: A Practical Guide
Standing up a Security Operations Center is one of the most impactful investments a growing organization can make. This guide walks through...
Jordan K.
Defensive Security Lead
Feb 18, 2026
6 min read
The Rise of AI-Powered Phishing: What You Need to Know
Generative AI has eliminated the spelling mistakes and awkward phrasing that once made phishing emails easy to spot. Here is how the threat...
Mo
Founder & Principal Consultant
Jan 22, 2026
6 min read
CMMC 2.0 Compliance: What Defense Contractors Must Do Now
The Cybersecurity Maturity Model Certification is no longer optional for defense contractors. Here is a practical breakdown of what CMMC 2.0...
Jordan K.
Defensive Security Lead
Nov 14, 2025
7 min read
Top 10 Vulnerabilities We Find in Every Pentest
After hundreds of engagements, certain vulnerabilities appear with remarkable consistency. Here are the ten issues we find most often and wh...
Alex R.
Senior Penetration Tester
Dec 5, 2025
6 min read
How We Use AI Agents for Security Automation
AI agents are transforming security operations by handling repetitive tasks at machine speed. Here is how we are deploying them responsibly...
Sam T.
Security Automation Engineer
Feb 3, 2026
6 min read
Data Loss Prevention: Beyond Just Blocking USB Drives
Effective DLP programs protect sensitive data wherever it lives and moves. Blocking USB ports is just the beginning of a comprehensive strat...
Jordan K.
Defensive Security Lead
Oct 8, 2025
7 min read
IoT Security Testing: The Overlooked Attack Surface
Connected devices are everywhere in corporate environments, yet they rarely receive the same security scrutiny as traditional IT assets. Her...
Alex R.
Senior Penetration Tester
Aug 20, 2025
7 min read
Stay ahead of the threat landscape.
Have questions about your organization's security posture? Our team is ready to help you identify and mitigate risks.
Book a Free Consultation