Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation
In an increasingly complex landscape dominated by cloud technology, understanding the intricacies of cloud security is more vital than ever. […] ...
So-Phish-ticated Attacks
August 27, 2024 Authors: Rui Ataide, Hermes Bojaxhi The GuidePoint Research and Intelligence Team (GRIT) has been tracking a highly […] ...
The Critical Role of Governance, Risk Management, and Compliance in Operational Technology (OT) in Critical Infrastructure Organizations
As the industrial sector rapidly evolves through Industry 4.0, integrating digital technologies into operational environments becomes increasingly complex. For C-level […] ...
GRIT Ransomware Report: July 2024
Grayson North | | Blog, Cybersecurity, GRIT, GRIT Blog, Incident Response & Threat Intelligence, Ransomware, Report
Additional contributors to this report: Jason Baker, Justin Timothy, Ryan Silver, and JP Mouton July 2024 yielded some answers to […] ...
Update from the Ransomware Trenches
GuidePoint Security | | Blog, GRIT Blog, Incident Response & Threat Intelligence, Ransomware, Threat Intel, Threat Research
Authors: Rui Ataide, Hermes Bojaxhi GuidePoint’s DFIR team is frequently called upon to respond to Ransomware incidents. While many such […] ...
Dispelling Continuous Threat Exposure Management (CTEM) Myths
Gartner defines Continuous Threat Exposure Management (CTEM) as a set of processes and capabilities that enable organizations to continually and […] ...
How Hackers Steal Your RFID Cards
[email protected] | | Blog, Cybersecurity, Red Team, RFID, Security Awareness & Education, Technical, Threat & Attack Simulation, Vulnerability Management & Penetration Testing
Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
White House Memo Pushes Federal Agencies on Cybersecurity
On July 10th, the White House released Memorandum M24-14, giving administrative agencies guidance for cybersecurity priorities when building FY26 budgets. The […] ...
One Does Not Simply … Get a Cybersecurity Job
Where to Begin With thousands of unfilled positions reported year over year, why is it so hard to get a […] ...
How to Make Adversaries Cry: Part 1
Joaquim Nogueira | | Blog, Cybersecurity, Technical, Threat & Attack Simulation, Vulnerability Management & Penetration Testing
In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...