Security Research & Insights

The Project0 Blog

Practical insights from the front lines of cybersecurity. Threat intelligence, penetration testing techniques, compliance guidance, and more.

All Articles

Showing 8 articles

Pentesting

Why Your Annual Pentest Isn't Enough

Annual penetration tests check a compliance box, but they leave your organization exposed for the other 364 days of the year. Here's why con...

M

Mo

Founder & Principal Consultant

Mar 10, 2026

5 min read

Read More →
Defensive

Building a SOC from Scratch: A Practical Guide

Standing up a Security Operations Center is one of the most impactful investments a growing organization can make. This guide walks through...

J

Jordan K.

Defensive Security Lead

Feb 18, 2026

6 min read

Read More →
Threat Intel

The Rise of AI-Powered Phishing: What You Need to Know

Generative AI has eliminated the spelling mistakes and awkward phrasing that once made phishing emails easy to spot. Here is how the threat...

M

Mo

Founder & Principal Consultant

Jan 22, 2026

6 min read

Read More →
Compliance

CMMC 2.0 Compliance: What Defense Contractors Must Do Now

The Cybersecurity Maturity Model Certification is no longer optional for defense contractors. Here is a practical breakdown of what CMMC 2.0...

J

Jordan K.

Defensive Security Lead

Nov 14, 2025

7 min read

Read More →
Pentesting

Top 10 Vulnerabilities We Find in Every Pentest

After hundreds of engagements, certain vulnerabilities appear with remarkable consistency. Here are the ten issues we find most often and wh...

A

Alex R.

Senior Penetration Tester

Dec 5, 2025

6 min read

Read More →
AI & Security

How We Use AI Agents for Security Automation

AI agents are transforming security operations by handling repetitive tasks at machine speed. Here is how we are deploying them responsibly...

S

Sam T.

Security Automation Engineer

Feb 3, 2026

6 min read

Read More →
Defensive

Data Loss Prevention: Beyond Just Blocking USB Drives

Effective DLP programs protect sensitive data wherever it lives and moves. Blocking USB ports is just the beginning of a comprehensive strat...

J

Jordan K.

Defensive Security Lead

Oct 8, 2025

7 min read

Read More →
Pentesting

IoT Security Testing: The Overlooked Attack Surface

Connected devices are everywhere in corporate environments, yet they rarely receive the same security scrutiny as traditional IT assets. Her...

A

Alex R.

Senior Penetration Tester

Aug 20, 2025

7 min read

Read More →

Stay ahead of the threat landscape.

Have questions about your organization's security posture? Our team is ready to help you identify and mitigate risks.

Book a Free Consultation