by Gate 15 | Oct 8, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. What is a post-incident analysis? A...
by Gate 15 | Sep 16, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. When ransomware hits, backups often determine...
by Gate 15 | Sep 3, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. While zero-day exploits tend to make headlines...
by Gate 15 | Aug 19, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. Hack Yourself First: Pen Testing for Prevention....
by Gate 15 | Jul 23, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. Introduction: Network segmentation...
by Gate 15 | Jul 9, 2025 | Blog, Cybersecurity, Ransomware, Ransomware Resilience, resilience
By Mackenzie Gryder, with Ben Taylor This blog is part of Gate 15’s Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals. Introduction: Multi-Factor Authentication (MFA)...