Get a Demo
    Browse by topic
    Subscribe to our news
    Picture of Tom Horyn

    Posts written by Tom Horyn

    Tom Horyn is Director of Marketing at Zentera Systems, where he leads go-to-market strategy, demand generation, and content across the company's Zero Trust portfolio - including the CoIP Platform, Virtual Chambers microsegmentation, and Ensage AI.
    With over two decades of marketing experience across cybersecurity and enterprise SaaS, Tom has held senior roles at companies ranging from early-stage startups to large-scale enterprises. His background spans demand generation, digital marketing, analytics, ABM, and content strategy, with a consistent focus on turning complex technology into clear, compelling narratives for technical and business audiences.
    Having spent his career at the intersection of cybersecurity and marketing, Tom writes for practitioner audiences with a focus on Zero Trust architecture, AI agent security, and critical infrastructure protection.


    News

    When a Vendor Gets Breached, Your Team Inherits the Incident

    TL;DR: On April 24, 2026, Medtronic confirmed that hackers accessed data in its corporate IT systems. Medical devices and hospital customer networks were unaffected, the company said. But hospital security teams still spent the following days ...
    Read

    Zero Trust

    How to Cloak Critical Infrastructure: Protecting Internet-Exposed PLCs Without Redesigning Industrial Networks

    TL;DR: On April 7, 2026, CISA joint advisory AA26-097A confirmed active exploitation of CVE-2021-22681 in Rockwell Automation Logix controllers by the Iranian IRGC-linked group CyberAv3ngers, with operational disruption and financial loss reported ...
    Read

    Zero Trust

    When Your AI Agent Goes Rogue: The Security Gap Nobody Planned For

    Two real 2024 incidents expose the AI agent security gap most enterprises haven't closed: autonomous agents operating without enforced boundaries, inside and outside approved frameworks.
    Read

    Cybersecurity

    Why Healthcare Ransomware Attacks Keep Shutting Down Hospitals

    On the morning of February 19, 2026, the University of Mississippi Medical Center - Mississippi's only academic medical center - woke up to a healthcare ransomware attack that took down its Epic electronic health records system, its phone lines, and ...
    Read

    News

    How Ransomware Spreads Laterally: Lessons from the SmarterTools Breach

    In late January 2026, SmarterTools confirmed that the Warlock (also known as Storm-2603) ransomware group breached its network by exploiting an unpatched SmarterMail server. According to the company's Chief Commercial Officer, the incident began on ...
    Read

    Zero Trust

    Why Zero Trust Architecture Requires Cutting Through Complexity - Not Adding More of It

    The most dangerous moment in a Zero Trust journey isn't the kickoff. It's the moment 12–18 months in when leaders finally look at what they've built - and realize they've made everything more complicated, and nothing meaningfully more secure.
    Read

    Zero Trust

    Zero Trust for Manufacturing: My Takeaways from the Webinar

    Manufacturing companies are facing a perfect storm of challenges. Ransomware attacks are spiking, intellectual property theft is on the rise, and the equipment that keeps factories running wasn’t designed with modern cyber threats in mind. Legacy OT ...
    Read

    Zero Trust

    How Zero Trust Delivers Stronger Ransomware Protection - Without Network Surgery

    Ransomware remains one of the most disruptive and costly threats facing enterprises. Recent attacks have shown how quickly a single compromised device can ripple into widespread downtime - disrupting travel, hospitals, and even critical ...
    Read

    Zero Trust

    Zero Trust: The New Standard for Critical Infrastructure

    The Growing Stakes for Critical Infrastructure Cyber threats to critical infrastructure are no longer theoretical. Just last week, the FBI and Cisco raised alarms over Russian-linked hackers exploiting a legacy Cisco vulnerability to infiltrate ...
    Read

    Cybersecurity

    IT vs OT: A Comprehensive Guide

    In today's rapidly evolving industrial landscape, the lines between Information Technology (IT) and Operational Technology (OT) are blurring like never before. For decades, these two domains operated in separate silos, each with distinct purposes, ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.