ADT-4 Pro Model Release:The definitive threat intelligence for the AI eraRead the research paper
Blog

Threat intelligence.
Engineering. Defence.

Insights from the team building PulseADT and the Glemad Research lab. No marketing content. Real analysis.

Engineering - Featured

Understanding Hypothesis-Chain Reasoning in Autonomous Threat Detection

How PulseADT builds a causal model of an attack - not a pile of alerts - and why that changes what autonomous response is possible.

March 5, 202612 min read
Read post
ADT Hypothesis Chain - Live Example
SIGNAL Anomalous login from new IP
CHAIN Credential stuffing pattern matched
CHAIN Privilege escalation attempt
CHAIN Lateral movement detected
ACTION Session terminated autonomously
EVID evt_8k2mNpQx logged + signed
Elapsed: 0.8 minutes
Threat IntelligenceFebruary 28, 2026

The West Africa Threat Landscape: What Changed in 2025 and What to Expect Next

Fintech fraud, BEC campaigns targeting logistics platforms, and SS7-based telecoms attacks are reshaping how African enterprises approach security.

9 min read
ComplianceFebruary 20, 2026

NDPR in 2026: What Nigerian Companies Need to Know Before the Next Audit

NITDA enforcement is intensifying. Here is what has changed, what is still unclear, and how automated evidence collection changes audit preparation.

7 min read
EngineeringFebruary 14, 2026

How Coordinated Defense Agents Scale Across Distributed Infrastructure

A technical walkthrough of the CDA architecture - how multi-agent coordination works without creating a centralised decision bottleneck.

15 min read
EngineeringFebruary 7, 2026

Policy-Bounded Actuation: How We Ensure Autonomous Actions Stay Within Your Rules

Autonomous response raises a legitimate question - who decides what the machine does? This post covers how PulseADT's policy layer keeps humans in control by design.

10 min read
ComplianceJanuary 30, 2026

PCI-DSS v4.0: Which Requirements You Can Now Meet with Automated Evidence

Mapping PulseADT's ADT Evidence Layer output to the updated PCI-DSS v4.0 control set - and where the gaps still require manual process.

8 min read
Product UpdatesJanuary 22, 2026

Eagle Max is Generally Available: Full Autonomous Contain, Remediate, and Recover

Today we are opening Eagle Max - Class 1 and Class 2 autonomous response - to all customers. Here is what that means and what you can do with it.

5 min read
Threat IntelligenceJanuary 15, 2026

SS7 and SIM-Swap Attacks Targeting African Telcos: Detection Without Manual Correlation

How ADT Signal Intelligence correlates SS7 signalling anomalies with identity events to catch SIM-swap fraud chains before subscriber impact.

11 min read
ResearchJanuary 8, 2026

Glemad Milestone Report: March 2026 - 680,000 Assets, 1.7M Threats Blocked Monthly

Independent Glemad Research benchmarks across the PulseADT deployment base. MTTD, containment rates, analyst hours saved, and coverage metrics.

6 min read
Stay Current

New posts, threat
reports, and research.

Published when there is something worth saying. No filler content. Unsubscribe in one click.

No spam. Unsubscribe any time.