Archive

Drawing the Line: How to Define Third-Party Cyber Risk Appetite That Actually Works

August 6, 2025 Vendors and partners help businesses move faster but they also introduce cyber risk.

GRITREP: Observed Malicious Driver Use Associated with Akira SonicWall Campaign

August 5, 2025 Bottom-Line Up Front (BLUF): We have observed Akira affiliates exploiting two common drivers as part of a suspected AV/EDR evasion effort following initial access involving SonicWall ab…

The Secret Life of APIs: Uncovering Hidden Endpoints and More

August 4, 2025 In the rapidly advancing world of web applications, single-page applications (SPAs) have become a staple for delivering a streamlined and efficient user experience.

The Strategic Power of Cyber Risk Appetite: Making Security Decisions with Clarity and Confidence

July 23, 2025 In cybersecurity, not every risk can be eliminated but every risk needs to be understood. A cyber risk appetite statement isn’t just part of a policy, it’s a decision-making tool.

The CRQ Mandate: Why Financial Risk Insight Is the Future of Cybersecurity

July 21, 2025 The CRQ Mandate: Why Financial Risk Insight Is the Future of Cybersecurity Cybersecurity today is not just a technical problem—it’s a strategic business opportunity.

F5 on How Fragmented Application Access Is Sabotaging Your Security

July 18, 2025 Guest Author: Corey Marshall, Director and Sr.

Insights from the GRIT Q2 2025 Ransomware & Cyber Threat Report

July 10, 2025 Ransomware continues to escalate, driving a more fragmented and aggressive threat landscape.

Playing the Cybersecurity Odds: How to Bet Smart in an Uncertain Economy

July 7, 2025 Playing the Cybersecurity Odds: How to Bet Smart in an Uncertain Economy Let’s face it—uncertainty is the name of the game.

How Ransomware Groups Exploit “Business as Usual” in FinServ

July 3, 2025 Guest Author: Chris Hencinski, Senior Solutions Architect, Expel In the first quarter of 2025, financial services was the most targeted industry.

Setting Boundaries: How to Define and Enforce Third-Party Cyber Risk Tolerance

June 30, 2025 Vendors play a critical role in scaling operations and delivering innovation—but their integration must be balanced with a clear understanding of cyber risk exposure.

The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073

June 27, 2025 Sometimes the best discoveries happen when you’re not even looking for them.

Expert Guidance, Real Impact: What the NTAS Advisory Means for Your Organization

June 25, 2025 Heightened tensions in the Middle East are a stark reminder that geopolitical conflict often spills over into cyberspace.