Breakpoint Blog

Recent Blog Posts

Benjamin Mossé • 16 Oct 2025

Manage Legacy IT Risks

The 2024-25 ASD Threat Report highlights legacy IT as one of the top risks facing organizations today. And they’re right to do so. On the surface, “patch and update your system...
Benjamin Mossé • 15 Oct 2025

Restrict Administrative Privileges

Restricting admin privileges is one of the most common recommendations in cybersecurity. And like most good advice, it’s easier said than done. The truth is, every system needs...

All Blog Posts

Benjamin Mossé • 14 Oct 2025

Action <> Reaction

Last month, I was speaking with a security team that had rolled out Security Awareness Training. ...
Benjamin Mossé • 13 Oct 2025

Logging Isn't the Problem. Detection Is.

The ACSC’s 2024–2025 Threat Report urges organizations to implement effective event logging. If ...
Benjamin Mossé • 12 Oct 2025

Ransomware Is Far From Over

If you’re responsible for protecting your business from serious disruption due to a cyber attack,...
Benjamin Mossé • 11 Oct 2025

The Business Language of Cyber Risk

When I started out as a penetration tester, I was regularly finding critical vulnerabilities in a...
Benjamin Mossé • 10 Oct 2025

Mental Model for Improving Relationships

One of the most underrated tools in a cybersecurity leader’s arsenal? Relationships.
Benjamin Mossé • 09 Oct 2025

The Shared Infrastructure Problem

One of the biggest challenges in cybersecurity is the Shared Infrastructure Problem. Many of us ...