Blog

Exploring the frontiers of cyber human risk and cognitive defense

May 16, 2025

Your Guide to the Behavioral Policy Creation Loop

Security policies get a bad rap because they're often inflexible to the workforce's productivity needs. What if there was a better way?

Gwen Betts Gwen Betts
Your Guide to the Behavioral Policy Creation Loop
May 7, 2025

Goliath + Maro: Cognitive Security for the Human Attack Surface

Most cybersecurity solutions treat the human attack surface like a footnote. Goliath Cybersecurity Group isn't playing that game. We're proud to announce they're partnering with Maro to pioneer a new ...

Jadon Montero Jadon Montero
Goliath + Maro: Cognitive Security for the Human Attack Surface
April 25, 2025

🧇 Our New Floor Supervisor: Building an AI Code Review Agent with Claude Code (and a Hint of Lumon)

Code reviews: necessary, but often as spiritually fulfilling as endless Macrodata Refinement on a Monday morning. What if you had a Milcheck to help?

Jen Andre Jen Andre
🧇 Our New Floor Supervisor: Building an AI Code Review Agent with Claude Code (and a Hint of Lumon)
April 23, 2025

Welcoming Jen Andre as Maro's CTO and Co-Founder

Jen Andre joins Maro as CTO, reuniting a team dedicated to revolutionizing cybersecurity with cognitive security solutions. Discover how they're shaping the future of human risk.

Jadon Montero Jadon Montero
Welcoming Jen Andre as Maro's CTO and Co-Founder
March 31, 2025

What is cognitive security?

It's the year 2025. Attackers continue to rely on human risk factors as the easiest way in. Cognitive security is the only way forward in the era of AI-powered social engineering attacks.

Gwen Betts Gwen Betts
What is cognitive security?
February 14, 2025

Rethinking Human Risk Starts with Guiding Behaviors

The human element is responsible for 68% of breaches, yet prevailing cybersecurity strategies overlook behavior-oriented approaches to build resilience.

Jadon Montero Jadon Montero
Rethinking Human Risk Starts with Guiding Behaviors

Hand wave iconWe're just getting started, but stay in touch while we build.

Are you interested in the intersection of people, cyber policy, security education, and a safe internet for all? Become an early newsletter subscriber!