What Black Hat Gets Wrong. July 2025 CINS Brief
Our Take

Ted Talks
Black Hat Ignores SMBs
By focusing on enterprise solutions, most of the companies at Black Hat effectively ignore SMB and SLG customers. Great for us, since those customers are our focus and our mission. But, bad for cybersecurity as a whole — cyber is a team sport, and too much of our critical infrastucture is left without comprehensive coverage.
Featured Article

What Most Smaller Organizations Get Wrong When Choosing Managed Cybersecurity
Traditional defenses — EDR, firewalls, and maybe something like a SIEM — can prove complex and unwieldy for smaller teams, and using these tools in isolation creates security gaps that sophisticated attackers can exploit. So after these traditional tools, where do you look next?
A Third Dimension of Visibility
Catch Up on Cyber News
- Skills gaps send CISOs in search of managed security providers (CSO Online)
- Strategic and technical leadership in flux: Q3 2025 CISO Top 10 priorities (SCWorld)
- Why your security team feels stuck (HelpNet Security)
- How the Internet of Things impacts everyone’s privacy (Fast Company)
- Beyond CVE: The hunt for other sources of vulnerability intel (CSO Online)
- Idle Infrastructure, Active Threats: Why Unmanaged Network Resources Are A Hacker’s Dream (Forbes)
Nomic News

Threat actors are increasing in sophistication and aren’t making exceptions for the small or underprepared. The same threats that target Fortune 500s also come after SMBs and organizations just growing into their digital maturity. Smaller organizations now need to be protected more than ever, but where to start? In recent years, managed services have stepped in to solve this paradox in various novel ways.
Learn How Managed NDR Protects SMBs
Why is it called the "CINS Brief" Newsletter?
"CINS" is a reference to the CINS Army. As one of the first widely distributed threat intelligence feeds, CINS Army filters out most of the noise caused by malicious scanners, allowing analysts to focus on more important threats. Its strength comes from the source of its data: A diverse Nomic customer base made up of real networks, with real people behind them.