Syndicated Blog

The Guiding Point | GuidePoint Security
Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation

Navigating Cloud Security: Q&A on the Importance of Collaboration and Innovation

In an increasingly complex landscape dominated by cloud technology, understanding the intricacies of cloud security is more vital than ever. […] ...
So-Phish-ticated Attacks

So-Phish-ticated Attacks

August 27, 2024 Authors: Rui Ataide, Hermes Bojaxhi The GuidePoint Research and Intelligence Team (GRIT) has been tracking a highly […] ...

The Critical Role of Governance, Risk Management, and Compliance in Operational Technology (OT) in Critical Infrastructure Organizations

As the industrial sector rapidly evolves through Industry 4.0, integrating digital technologies into operational environments becomes increasingly complex. For C-level […] ...
GRIT Ransomware Report: July 2024

GRIT Ransomware Report: July 2024

Additional contributors to this report: Jason Baker, Justin Timothy, Ryan Silver, and JP Mouton July 2024 yielded some answers to […] ...
Update from the Ransomware Trenches

Update from the Ransomware Trenches

Authors: Rui Ataide, Hermes Bojaxhi GuidePoint’s DFIR team is frequently called upon to respond to Ransomware incidents. While many such […] ...

Dispelling Continuous Threat Exposure Management (CTEM) Myths

Gartner defines Continuous Threat Exposure Management (CTEM) as a set of processes and capabilities that enable organizations to continually and […] ...
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...

White House Memo Pushes Federal Agencies on Cybersecurity

On July 10th, the White House released Memorandum M24-14, giving administrative agencies guidance for cybersecurity priorities when building FY26 budgets.  The […] ...
Infosec Job Hunting w/ BanjoCrashland

One Does Not Simply … Get a Cybersecurity Job

| | SBN News
Where to Begin With thousands of unfilled positions reported year over year, why is it so hard to get a […] ...
How to Make Adversaries Cry: Part 1

How to Make Adversaries Cry: Part 1

In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...

Application Security Check Up