Every year, October 1 marks the kickoff of Cybersecurity Awareness Month. GuidePoint Security is proud to join the national effort, […]| GuidePoint Security
As organizations operate with increasingly constrained security resources and accelerated development timelines, traditional point-in-time penetration testing no longer provides adequate […]| GuidePoint Security
Every organization has risks, but not every organization manages them effectively. A risk register is one of the most common […]| GuidePoint Security
When it comes to cyber insurance, most organizations think of it as a financial safety net. Pay the premiums, check […]| GuidePoint Security
The Final Rule is Official The Department of Defense published the Defense Federal Acquisition Regulation Supplement: Assessing Contractor Implementation of […]| GuidePoint Security
You may have heard the term “vibe coding,” and the controversy surrounding it may have piqued your interest. But what […]| GuidePoint Security
Penetration testing (pentesting) has fundamentally changed. We now have AI assistants analyzing attack paths and automated scanners running continuously, upending […]| GuidePoint Security
It began with an unassuming executable named calendaromatic.exe. At first glance, it appeared to be a harmless desktop application wrapped […]| GuidePoint Security
Ask me anything discussing how integrating cloud security with IAM can transform your organization’s cybersecurity posture.| GuidePoint Security
GuidePoint Security The Guiding Point. Trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk.| GuidePoint Security
If you haven’t yet read Part 1 of this two-part blog series, The Dark Side of Passwords, take a look! […]| GuidePoint Security
As Fal.Con 2025 approaches, we’re reflecting on more than a decade of partnership with CrowdStrike—a collaboration built on deep expertise, […]| GuidePoint Security
Budget constraints, limited staff, and competing priorities often delay critical security improvements. At the same time, attackers exploit gaps to […]| GuidePoint Security
Concerned about password security? Learn the most common techniques for cracking passwords so you can better secure your environment.| GuidePoint Security
PAM has become one of the most important things your business can do to protect itself. Learn why and what you can do.| GuidePoint Security
Crisis Action Management Planning (CAMP) elevates business resilience, and helps teams prepare, respond, and adapt to threats.| GuidePoint Security
Active Directory is a rich target for attackers. Learn why and how organizations can protect themselves from becoming the next breach.| GuidePoint Security
GuidePoint Security provides trusted cybersecurity consulting expertise, solutions, and services that help organizations make better decisions and minimize risk.| GuidePoint Security
Business Impact Analysis (BIA) enables organizations to evolve their business resilience strategies in response to emerging threats. Here’s why!| GuidePoint Security
Despite investments and increased regulatory pressure, most organizations are not reaching IAM maturity. Why? What are high performers doing right?| GuidePoint Security