Breakpoint Blog

Page 2

Benjamin Mossé • 08 Oct 2025

Who's Crown Jewels?

Most cyber leaders talk about “protecting the crown jewels.” But have you ever stopped to ask - w...
Benjamin Mossé • 07 Oct 2025

The Basics Aren't So Basic

Let’s drop the slogans and face the facts. For a decade, people have preached “focus on the basic...
Benjamin Mossé • 06 Oct 2025

Understand First, Then Do Security

When I look back, the biggest progress I’ve seen in cybersecurity hasn’t come from new tools or f...
Benjamin Mossé • 05 Oct 2025

Mike Burgess's Five Knows of Cyber Security

Back in 2015, Mike Burgess introduced his mental model called “The Five Knows”, a framework built...
Benjamin Mossé • 04 Oct 2025

The Always-More-Access Loops

Attackers think in Access Loops. I call the entire process the Always-More-Access Loops (AMAL).
Benjamin Mossé • 03 Oct 2025

The Asymmetrical Power of People

When I began my career in penetration testing and vulnerability research, it quickly became clear...
Benjamin Mossé • 02 Oct 2025

Compromised Credentials: We're Looking at It Wrong

Yesterday, I was skimming the ACSC Annual Threat Report over lunch. No surprise - the #1 inciden...
Benjamin Mossé • 01 Oct 2025

Security Isn't Broken - It's Built That Way

The most dangerous malware doesn’t need to be installed. It’s already there.