⚡ Secure your future with a 36% discount on our
certifications
Certifications
Domains
Cloud Security
Cyber Defense
DevSecOps
Digital Forensics
Governance, Risk and Compliance
Incident Response
Open Source Intelligence
Red Teaming
Threat Hunting
Threat Intelligence
Vulnerability Research
Domains
Penetration Testing
Red Teaming
Reverse Engineering
Threat Hunting
Threat Intelligence
Vulnerability Research
Defensive Certifications
Certified Blue Teamer
Certified DFIR Specialist
Certified Cloud Security Engineer
Certified Threat Hunter
Certified Threat Intelligence Analyst
Certified Reverse Engineer
View more certifications
Offensive Certifications
Certified OSINT Expert
Certified Penetration Tester
Certified Cloud Penetration Tester
Certified Red Teamer
Certified Vulnerability Researcher
Breakpoint
About Us
MCSI
Our History
Hall of Fame
Careers at MCSI
Certifications
Online Bootcamps
Knowledge Tests
Classroom Courses
Community Initiatives
Emerging and Frontier Nations
Next-Generation Cyber Talent
Regional and National CERTs
Alliances with Charities
Protecting Non-Profits
Veterans in Cyber
Women in Cyber
Community Partners
Women's Society of Cyberjutsu
WoSEC (Women of Security)
WiCyS Windsor
WiCyS India
WiT Albania
Seidea
View more community partners
Resources
Solutions Assessments
ASD Cyber Skills Framework
Videos and Guides
MCSI Curriculum Standard
Why MCSI?
Training Platform
Contact Us
Breakpoint Blog
Debug Your Thinking. Unlock Breakthroughs.
Page 2
Benjamin Mossé • 08 Oct 2025
Who's Crown Jewels?
Most cyber leaders talk about “protecting the crown jewels.” But have you ever stopped to ask - w...
Benjamin Mossé • 07 Oct 2025
The Basics Aren't So Basic
Let’s drop the slogans and face the facts. For a decade, people have preached “focus on the basic...
Benjamin Mossé • 06 Oct 2025
Understand First, Then Do Security
When I look back, the biggest progress I’ve seen in cybersecurity hasn’t come from new tools or f...
Benjamin Mossé • 05 Oct 2025
Mike Burgess's Five Knows of Cyber Security
Back in 2015, Mike Burgess introduced his mental model called “The Five Knows”, a framework built...
Benjamin Mossé • 04 Oct 2025
The Always-More-Access Loops
Attackers think in Access Loops. I call the entire process the Always-More-Access Loops (AMAL).
Benjamin Mossé • 03 Oct 2025
The Asymmetrical Power of People
When I began my career in penetration testing and vulnerability research, it quickly became clear...
Benjamin Mossé • 02 Oct 2025
Compromised Credentials: We're Looking at It Wrong
Yesterday, I was skimming the ACSC Annual Threat Report over lunch. No surprise - the #1 inciden...
Benjamin Mossé • 01 Oct 2025
Security Isn't Broken - It's Built That Way
The most dangerous malware doesn’t need to be installed. It’s already there.
← Previous
1
2
3
4
Next →