v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]
We have implemented and continue to enhance information security processes designed to identify, assess and manage material risks from cybersecurity threats to our information systems and data, including systems and services that support our corporate operations and third-party hosted platforms on which we rely. Our approach is intended to support operational resilience and protection of critical assets and information as we build our business.
As an early-stage company, our cybersecurity program has been governed through cross-functional management oversight, supported by external specialists. In connection with this approach, we completed a structured assessment of key IT and security domains and developed a phased mitigation plan to improve our security posture and maturity over time. The
assessment informed prioritized initiatives focused on common early-stage risk areas such as identity and access controls, device and endpoint management, mobile access controls, external sharing and data protections, and security monitoring and alerting.
We have implemented, and are continuing to implement, security measures appropriate to our environment and stage of development, including measures focused on (i) stronger authentication and access controls, (ii) management and security baselines for endpoints and mobile devices, (iii) email and collaboration security, (iv) enhanced logging and monitoring, and (v) incident response preparedness. We also leverage managed IT and cybersecurity capabilities to support functions such as endpoint protection, DNS security filtering, dark web monitoring, cybersecurity awareness training, and email security and recovery capabilities.
We consider cybersecurity risks as part of our broader enterprise risk management processes, including when evaluating key vendors and service providers. For a description of risks from cybersecurity threats that may materially affect us and how they may do so, see Part I, Item 1A. “Risk Factors” in this Annual Report on Form 10-K.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] We have implemented and continue to enhance information security processes designed to identify, assess and manage material risks from cybersecurity threats to our information systems and data, including systems and services that support our corporate operations and third-party hosted platforms on which we rely. Our approach is intended to support operational resilience and protection of critical assets and information as we build our business.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block]
Our board of directors oversees cybersecurity risk as part of its oversight of enterprise risk management. Management provides updates to the board as appropriate regarding cybersecurity risks, program maturity and key initiatives.
Management is responsible for day-to-day cybersecurity risk management. Historically, strategic oversight of our cybersecurity risk management program has been led by our Vice President of Risk, with active involvement from our Chief Financial Officer, Chief Operating Officer, and General Counsel, and support from external service providers. In March 2026, we hired a Chief Information Officer to provide internal executive leadership for enterprise IT and cybersecurity strategy and execution. Our Chief Information Officer has more than 35 years of IT leadership experience, including experience overseeing cybersecurity, cloud-first architectures and Zero Trust implementations, and large-scale technology and vendor management programs.
We maintain incident management and escalation practices designed to support timely internal reporting and coordination, including involvement of senior management based on the nature and potential impact of an event and, as appropriate, reporting to the board.
As an enhancement to our board’s oversight of our risk management function, our board has formed a risk and disclosure committee comprised of independent directors to monitor our risk management function and disclosure practices and to provide oversight and direction with respect to our efforts to identify, manage and mitigate material risks.
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Our board of directors oversees cybersecurity risk as part of its oversight of enterprise risk management.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Management provides updates to the board as appropriate regarding cybersecurity risks, program maturity and key initiatives.
Cybersecurity Risk Role of Management [Text Block] Management is responsible for day-to-day cybersecurity risk management. Historically, strategic oversight of our cybersecurity risk management program has been led by our Vice President of Risk, with active involvement from our Chief Financial Officer, Chief Operating Officer, and General Counsel, and support from external service providers.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] In March 2026, we hired a Chief Information Officer to provide internal executive leadership for enterprise IT and cybersecurity strategy and execution.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] Our Chief Information Officer has more than 35 years of IT leadership experience, including experience overseeing cybersecurity, cloud-first architectures and Zero Trust implementations, and large-scale technology and vendor management programs.
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block]
Management is responsible for day-to-day cybersecurity risk management. Historically, strategic oversight of our cybersecurity risk management program has been led by our Vice President of Risk, with active involvement from our Chief Financial Officer, Chief Operating Officer, and General Counsel, and support from external service providers. In March 2026, we hired a Chief Information Officer to provide internal executive leadership for enterprise IT and cybersecurity strategy and execution. Our Chief Information Officer has more than 35 years of IT leadership experience, including experience overseeing cybersecurity, cloud-first architectures and Zero Trust implementations, and large-scale technology and vendor management programs.
We maintain incident management and escalation practices designed to support timely internal reporting and coordination, including involvement of senior management based on the nature and potential impact of an event and, as appropriate, reporting to the board.
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] true