SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery
Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […] ... Read More
The CMMC Proposed Rule is Out – Now What?
What is CMMC? NIST Special Publication 800-171 (110 requirements) was first published in 2016 with an implementation requirement date of […] ... Read More
Quarterly GRIT Ransomware Report – Q2 2023
With the second quarter of 2023 behind us, it’s time to talk about GRIT’s findings from April, May, and June. […] ... Read More
Quarterly GRIT Ransomware Report – Q1 2023
With the close of 2023’s first quarter, we’re publishing GRIT’s findings and research from the first three months of the […] ... Read More
Building a Secure Coding Culture: Integrating AppSec into the Development Lifecycle
GuidePoint Security has the expertise in Secure Coding and integrating AppSec and DevSecOps teams to ensure your organization stays safe ... Read More
Annual GRIT Ransomware Report – 2022
With 2022 behind us, instead of the usual Monthly or Quarterly GRIT Ransomware Report we’ve put together the first Annual […] ... Read More
Moving Containers: Uncovering Challenges. Finding Solutions.
Get expert tips and best practices for securing containers in your business in our blog from Cloud Security experts, GuidePoint Security, Lacework and AWS ... Read More
GRIT Ransomware Report – Q3 2022
Usually at this time each month, we’d be publishing a detailed GRIT Ransomware Report covering the previous month’s ransomware trends. […] ... Read More
Cybersecurity Awareness Month 2022
See Yourself in Cybersecurity Once again we’re about to round the corner into October, and with that comes an explosion […] ... Read More
Considerations for merging your IT and OT environments into ICS
Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ... Read More