Blog: Cybersecurity

  • AI Security
AI is Here: Who’s in Charge?
Posted by: Ben MartinMooney
Read More 2 min read
  • Threat & Attack Simulation
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
Posted by: Andre Rosario
Read More 10 min read
  • Governance, Risk & Compliance
Aligning Cybersecurity and Third-Party Risk Management with Business Goals
Posted by: Will Klotz
Read More 4 min read
  • GRIT® Blog
Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats
Posted by: Jason Baker
Read More 13 min read
  • GRIT® Blog
GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies
Posted by: Ben MartinMooney
Read More 3 min read
  • GRIT® Blog
Ongoing report: Babuk2 (Babuk-Bjorka)
Posted by: Ryan Silver
Read More 3 min read
  • GRIT® Blog
GRIT’s 2025 Report: Post-Compromise Detection Strategies
Posted by: Ben MartinMooney
Read More 2 min read
  • OT Security Services
OT/ICS Security: Beyond the Easy Button
Posted by: OT Practice
Read More 2 min read
  • Security Awareness & Education
Considerations for a Balanced Critical Infrastructure Security Strategy
Posted by: Christopher Warner
Read More 3 min read
  • Application Security
The Critical Need for Multi-Role Testing in Application Security
Posted by: Austin Turecek
Read More 7 min read
  • Governance, Risk & Compliance
CMMC Is Here – Are You Ready? (Better Late Than Never)
Posted by: Dan Mengel
Read More 4 min read
  • Governance, Risk & Compliance
Understanding and Taking Advantage of the NYDFS Risk Assessment Requirement
Posted by: Will Klotz
Read More 3 min read