Storagepipe Is Now Thrive

GridWay Is Now Thrive

Cybersecurity threats are not a matter of “if,” but “when.” Mid-sized organizations face an increasingly complex threat landscape, with cybercriminals targeting everything from endpoints and cloud environments to email systems and supply chains. While many…

Kevin Landt, VP of Product, Cybersecurity
April 9, 2026 3 Min Read

While routine CI/CD pipelines ran and developer machines updated their dependencies, a state-sponsored actor had already poisoned one of the...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
April 1, 2026 6 Min Read

Cyber threats evolve constantly, and new vulnerabilities are discovered every day. For organizations trying to maintain a strong security po...

Kevin Landt, VP of Product, Cybersecurity
March 31, 2026 4 Min Read
Subscribe Via Email

While Handala’s wiper operation made headlines, a stealthier and more dangerous campaign was already underway. Iran’s Seedworm group has quietly pre-positioned inside U.S. and Israeli critical infrastructure and the clock is ticking.  The Quieter Campaign  When the Handala wiper operation hit Stryker…

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
March 20, 2026 6 Min Read

Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Michelle Canepa, who is based out of Thrive’s Lakeland, FL office. In her role, Michelle leads a team of Client…

Thrive
March 20, 2026 3 Min Read

A Fortune 500 medical technology giant left with 200,000 wiped devices, surgical supply chains halted, and cardiac monitoring systems taken offline — all without a single line of malware touching the network. This post is…

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
March 13, 2026 6 Min Read

Financial institutions remain one of the most aggressively targeted sectors in the global cyber threat landscape. From organized cybercrim...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
March 12, 2026 2 Min Read

Geopolitical conflicts increasingly extend beyond traditional battlefields. Today, military escalation is often accompanied by coordinated c...

Christopher Clark, Simon White, and Orlahn Fabian, cybersecurity incident responder team
March 4, 2026 2 Min Read

Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Angela Capen. As the Strateg...

Thrive
February 27, 2026 3 Min Read

Gartner’s Predicts 2026: Evolving Threats and AI Adoption research highlights a pivotal shift in infrastructure security. As agentic AI becomes embedded across business operations, security leaders must rethink how controls are deployed, integrated, and governed.…

Kevin Landt, VP of Product, Cybersecurity
February 24, 2026 3 Min Read

Email is one of the oldest vectors for threats into your IT – and it is still one of the most common. Email servers can pose security risks in two ways. First, through malicious email…

Ella Ballard, product marketing
February 23, 2026 3 Min Read