Archive

Navigating Incident Response Documentation

May 15, 2025 Understanding Plans, Playbooks, and Runbooks When a cybersecurity breach or an unexpected disruption occurs, time is critical.

Bridging the Gap: How a Controls-Focused Cybersecurity Program Aligns SEC Rules with Daily Operations

May 13, 2025 With the U.S.

Interlock Intrusion: How Interlock Achieves Encryption

May 8, 2025 Background Organizations often call on GuidePoint Security analysts to support and consult on Digital Forensics and Incident Response (DFIR) efforts, focusing on remediation, recovery, and…

Are You Using CNAPP to Its Full Potential, or Just Paying for It?

May 6, 2025 Over the last few years, CNAPP (Cloud-Native Application Protection Platform) has captured the attention of security leaders by promising a more unified approach to securing cloud environm…

The Power of Women in Cybersecurity: Mentorship, Community, and Rising Together

May 5, 2025 Author: Brittany Huffman, Training Coordinator, GPSU, GuidePoint Security In the high-stakes world of cybersecurity—where threats are invisible but the impact is immense—one of the big…

AI is Here: Who’s in Charge?

April 22, 2025 Everybody and their brother (and sister) is talking about AI—and for good reason. AI can be a tremendous business enabler.

Insights from the GRIT 2025 Q1 Ransomware & Cyber Threat Report

April 10, 2025 Ransomware continues to surge, reshaping the threat landscape.

RansomSnub: RansomHub’s Affiliate Confusion

April 8, 2025 Executive Summary Since RansomHub’s emergence in early 2024, the group has become the most prolific Ransomware-as-a-Service group operating today.

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

April 8, 2025 As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one vulnerability no system can fully guard agai…

Identities and IAM Trends: Q&A With a Saviynt Identity Expert

April 3, 2025 Guest Author: Ehud Amiri, SVP Product Management, Savyint How will the threat to identities change over the coming year? AI will be the most disruptive force, driving changes in both thr…

Supporting Continuous Learning in AI Governance and Security

April 1, 2025 I’d like to begin this post with a heartfelt thank you to everyone who joined our recent Brick House webinar on AI governance.

Aligning Cybersecurity and Third-Party Risk Management with Business Goals

March 25, 2025 In the cybersecurity risk world, we often encounter the issue of not speaking the same language as the business.