Storagepipe Is Now Thrive

GridWay Is Now Thrive


Just a year ago, the U.S. Security and Exchange Commission (SEC) adopted rules requiring registrants to provide annual enhanced and standardized disclosures regarding “cybersecurity risk management, strategy, governance, and incidents.” This ruling aims to bring…

Scot Guido, Managing Partner, Financial Services
July 24, 2024 3 Min Read

As you may remember from our first blog post on strengthening financial IT resilience, the Digital Operational Resilience Act (DORA) was ena...

Ian Bowell, vCISO
July 23, 2024 5 Min Read

As businesses grow and technology continues to make advancements, managing your IT stack can become convoluted and lead to overlap or blind ...

Kevin Landt, VP of Product, Cybersecurity
July 17, 2024 2 Min Read
Subscribe Via Email

In this Gartner® report on Cybersecurity Platform Consolidation, you can learn how to improve protection, lower TCO, and speed responsiveness through vendor consolidation.

June 27, 2024 < 1 Min Read

This month, NHS London was victim to a brutal cyberattack, forcing admin to cancel operations and transfer emergency patients to alternative centres immediately. Among those affected are some of the best-known hospitals in the country,…

June 19, 2024 4 Min Read

Today, robust cybersecurity is a critical requirement, and organizations are under intense pressure to protect their sensitive data and adhe...

Kevin Landt, VP of Product, Cybersecurity, Thrive
June 13, 2024 3 Min Read

Cyber attacks are becoming increasingly frequent and more complex, so it’s vital to be proactive and lower the odds of a successful breach...

Kevin Landt, VP of Product, Cybersecurity
May 17, 2024 2 Min Read

The Phantom of the Opera is the longest-running show on Broadway with over 13,000 performances and a 35-year tenure performing to packed hou...

Steve Tilley, VP Sales, Thrive UK
April 24, 2024 3 Min Read

Since 2021, Identity Management Day has been celebrated annually as an event dedicated to raising awareness about the importance of protecting personal information online. Held on the second Tuesday of April, this day serves as…

Michael Gray, CTO
April 9, 2024 2 Min Read

The evolution of cyber threats and the ingenuity of cyber criminals require organizations to address vulnerabilities before they can be exploited. However, it’s not realistic to patch every exposure and traditional approaches often miss the…

Kevin Landt, VP of Product, Cybersecurity, Thrive
March 26, 2024 2 Min Read