Post-Quantum Cryptography Explained
Technological development has a way of quietly redefining what we take for granted. Each wave of innovation brings real progress, but it also reshapes the assumptions we rely on to keep systems secure. Over the past several years, much of the conversation has centered on how organizations adopt and operationalize advanced technologies like AI. As […]
Generative AI vs Agentic AI: Which is Right for Your Organization?
One thing we have collectively learned over the last few years at KNZ Solutions is that technology is always evolving at a pace that can feel breathless. We used to say we’d have to reinvent our strategies every five years, but now it feels like it’s happening every two. As we navigate 2026, the conversation […]
Securing IoT and OT Devices with NAC
Networks have evolved significantly over time. They were once simply used to connect computers via switches (Layer 2). As the need arose for these computers to communicate across different networks, routers were introduced. To protect these systems from network-based threats, firewalls soon followed. As networks expanded to support more than just computers, securing IoT and […]
In Firewalls we Trust? – Part 2
What is defense in depth? In the previous article, I defined it as an approach to protection that involves layering a series of defense mechanisms to safeguard valuable data and information. Consider a factory setting: would the factory, receptionist, or factory workers allow anyone to walk in and roam freely? No, they wouldn’t, for reasons […]
In Firewalls We Trust? – Part 1
Often in meetings, whenever the topic of security arises, I’ve frequently encountered clients expressing confidence with statements like, “We have a firewall, so we’re covered.” However, it’s essential to recognize that security transcends the simplistic notion of a protective barrier at the network’s edge. The landscape of security in technology is dynamic, with threats constantly […]