by Rana Jabbour | Dec 17, 2025 | Blog
This post was originally shared with GRIP subscribers on 16 December 2025 and is being shared here for broader seasonal threat awareness. As Gate 15’s Jennifer Lyn Walker wrote, “As the holiday shopping season is underway, we’d like to take this...
by Gate 15 | Oct 8, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. What is a post-incident analysis? A...
by Gate 15 | Sep 16, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. When ransomware hits, backups often determine...
by Gate 15 | Sep 3, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. While zero-day exploits tend to make headlines...
by Gate 15 | Aug 19, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. Hack Yourself First: Pen Testing for Prevention....
by Gate 15 | Jul 23, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. Introduction: Network segmentation...