Archive

Update from the Trenches

Ivanti CSA Investigation/Detection Details   October 9, 2024 Authors: Rui Ataide, Andrew Nelson, and Hermes Bojaxhi GuidePoint Security has recently been engaged on several incidents related to f…

NIST CSF 2.0 Is Here: How Will You Adapt?

October 8, 2024 The new NIST Cybersecurity Framework (CSF) 2.0 framework comes with multiple important and long-awaited updates.

Cybersecurity Awareness Month: Essential Cybersecurity Tips from a CISO for a Safer Digital World 

October 3, 2024 Author: Joseph Carson, Chief Security Scientist, Delinea Cybersecurity Awareness Month is a crucial reminder of the constant digital threats we face and the importance of taking proact…

Risky Recovery: Ransomware “Decryption” Scams Remain in 2024

September 19, 2024 Note: To protect the identity of the individuals involved in these events, some details of the ransomware attack and recovery company have been altered.

Hazard Ransomware – A Successful Broken Encryptor Story

September 10, 2024 Ransomware encryption can be one of the most devastating security events for an organization, potentially halting operations and causing significant financial and emotional stress.

Threat Brief: Lapsus$

Published 3/30/22, 9:00am Between March 20, 2022, and March 21, 2022, the eCrime group known as LAPSUS$ released several screenshots via Telegram indicating that they had successfully breached Okta an…

Fundamentals for Fighting Cybercrime

As a fraud prevention expert, I admittedly struggle with the con artist alter ego that precedes me in interviews and speaking engagements.

6 Best Practices for Evaluating Cybersecurity Tools

A question we regularly hear from our clients is “How can I be sure my tools are working to protect my sensitive data?” Most of our clients are continually evaluating their security architecture t…