The Edge is Popular For All The Wrong Reasons. CINS Brief August 2025
Our Take

Hidden Dangers Lurking at the Edge
Heads were nodding in agreement during our presentation at GMIS International MEETS last month, where we discussed the modern Edge and its exposure to breaches. A lot of opinions on how to mitigate the risks of the Edge, including our bias toward our own Nomic Outpost, but one thing's for sure: It's not an issue that can be ignored anymore.
Featured Article

Why VPNs and Edge Services Are Under Siege (and What To Do About It)
Brute force attacks against VPNs, remote access applications, and other edge services are alive and well, and hammering away harder than ever. Attackers are relentlessly targeting VPNs and firewalls as entry points, while nearly 30% of breaches begin at the edge of the network.
Read About Brute Force Attacks
In the News
In Other News
- CISA says it’s not abandoning the states. Cyber officials aren’t so sure (StateScoop)
- CISA’s relationship with industry needs work to reestablish trust, experts say (Cybersecurity Dive)
- Why DNS threats should be on every CISO’s radar in 2025 (HelpNet Security)
- Utilities, Factories at Risk From Encryption Holes in Industrial Protocol (Dark Reading)
- Only 49% of companies to increase cyber budget after a breach (CSO Online)
- Study Says US Firms Are Too Confident About Their Cybersecurity (Security Magazine)
Nomic News

Threat actors are increasing in sophistication and aren’t making exceptions for the small or underprepared. The same threats that target Fortune 500s also come after SMBs and organizations just growing into their digital maturity. Smaller organizations now need to be protected more than ever, but where to start? In recent years, managed services have stepped in to solve this paradox in various novel ways.
Learn How Managed NDR Protects SMBs
Why is it called the "CINS Brief" Newsletter?
"CINS" is a reference to the CINS Army. As one of the first widely distributed threat intelligence feeds, CINS Army filters out most of the noise caused by malicious scanners, allowing analysts to focus on more important threats. Its strength comes from the source of its data: A diverse Nomic customer base made up of real networks, with real people behind them.