Post-Quantum Cryptography Explained

Technological development has a way of quietly redefining what we take for granted. Each wave of innovation brings real progress, but it also reshapes the assumptions we rely on to keep systems secure. Over the past several years, much of the conversation has centered on how organizations adopt and operationalize advanced technologies like AI. As […]

Generative AI vs Agentic AI: Which is Right for Your Organization?

One thing we have collectively learned over the last few years at KNZ Solutions is that technology is always evolving at a pace that can feel breathless. We used to say we’d have to reinvent our strategies every five years, but now it feels like it’s happening every two. As we navigate 2026, the conversation […]

Blog header image featuring an active industrial factory with a dark blue filter

Securing IoT and OT Devices with NAC

Networks have evolved significantly over time. They were once simply used to connect computers via switches (Layer 2). As the need arose for these computers to communicate across different networks, routers were introduced. To protect these systems from network-based threats, firewalls soon followed. As networks expanded to support more than just computers, securing IoT and […]

Blog Title Image Introducing In Firewalls we Trust Part 2

In Firewalls we Trust? – Part 2

What is defense in depth? In the previous article, I defined it as an approach to protection that involves layering a series of defense mechanisms to safeguard valuable data and information. Consider a factory setting: would the factory, receptionist, or factory workers allow anyone to walk in and roam freely? No, they wouldn’t, for reasons […]

Blog Title Image showing a person typing on a laptop with a security lock watermark

In Firewalls We Trust? – Part 1

Often in meetings, whenever the topic of security arises, I’ve frequently encountered clients expressing confidence with statements like, “We have a firewall, so we’re covered.” However, it’s essential to recognize that security transcends the simplistic notion of a protective barrier at the network’s edge. The landscape of security in technology is dynamic, with threats constantly […]