Deep Dive into LLMs like ChatGPT

Supporting Continuous Learning in AI Governance and Security

I’d like to begin this post with a heartfelt thank you to everyone who joined our recent Brick House webinar […] ...
Aligning Cybersecurity and Third-Party Risk Management with Business Goals

Aligning Cybersecurity and Third-Party Risk Management with Business Goals

In the cybersecurity risk world, we often encounter the issue of not speaking the same language as the business. This […] ...
Rethinking Risk: ICS & OT Security with Purdue 2.0 and GRC

Rethinking Risk: ICS & OT Security with Purdue 2.0 and GRC

The rise of the extended Internet of Things (XIoT) across industrial (IIoT), healthcare (IoMT), commercial (OT, BMS/EMS/ACS/iBAS/FMS), and other sectors […] ...
Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

Key Takeaways During the period covered by the Black Basta leaked chat logs (18 September 2023 – 28 September 2024), […] ...
Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear

Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear

In early March 2025, GRIT received reports from multiple organizations regarding suspicious physical letters delivered by mail from US addresses […] ...
Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates

NOTE:  This article discusses proposed changes to existing regulations.  These changes are not in effect as of this article’s date […] ...
GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies

GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies

Ransomware threats continue evolving, with the most successful groups refining their tactics to maximize impact over the last year. Understanding […] ...
GRIT’s 2025 Report: Annual Vulnerability Analysis and Exploitation Trends

GRIT’s 2025 Report: Annual Vulnerability Analysis and Exploitation Trends

2024 saw an unprecedented surge in vulnerability disclosures, with over 39,000 vulnerabilities published. While this reflects the industry’s commitment to […] ...
GRIT 2025 Report: Post-Compromise Detection Strategies

GRIT 2025 Report: Post-Compromise Detection Strategies

This blog marks the beginning of a series based on the findings in the GRIT 2025 Ransomware and Cyber Threat […] ...
Considerations for a Balanced Critical Infrastructure Security Strategy

Considerations for a Balanced Critical Infrastructure Security Strategy

With the Presidential administration changeover happening soon, there has been much discussion of potential regulatory rollback, restructuring, or elimination of […] ...