Blog: Cybersecurity

  • Blog
Setting Boundaries: How to Define and Enforce Third-Party Cyber Risk Tolerance
Posted by: Will Klotz
Read More 2 min read
  • Blog
Operationalizing Cyber Risk Tolerance: From Policy to Practice
Posted by: Will Klotz
Read More 3 min read
  • Incident Response & Threat Intelligence
When to Call for Backup: How to Know It’s Time for IR Support
Posted by: Blake Cifelli
Read More 3 min read
  • Incident Response & Threat Intelligence
You’ve Contained the Threat — What Comes Next? From Recovery to Lessons Learned
Posted by: Blake Cifelli
Read More 3 min read
  • AI Security
AI is Here: Who’s in Charge?
Posted by: Ben MartinMooney
Read More 2 min read
  • Threat & Attack Simulation
This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
Posted by: Andre Rosario
Read More 10 min read
  • Governance, Risk & Compliance
Aligning Cybersecurity and Third-Party Risk Management with Business Goals
Posted by: Will Klotz
Read More 4 min read
  • GRIT® Blog
Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats
Posted by: Jason Baker
Read More 13 min read
  • GRIT® Blog
GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies
Posted by: Ben MartinMooney
Read More 3 min read
  • GRIT® Blog
Ongoing report: Babuk2 (Babuk-Bjorka)
Posted by: Ryan Silver
Read More 3 min read
  • GRIT® Blog
GRIT’s 2025 Report: Post-Compromise Detection Strategies
Posted by: Ben MartinMooney
Read More 2 min read
  • OT Security Services
OT/ICS Security: Beyond the Easy Button
Posted by: OT Practice
Read More 2 min read