Thought Leadership
While Handala’s wiper operation made headlines, a stealthier and more dangerous campaign was already underway. Iran’s Seedworm group has quietly pre-positioned inside U.S. and Israeli critical infrastructure and the clock is ticking. The Quieter Campaign When the Handala wiper operation hit Stryker…
A Fortune 500 medical technology giant left with 200,000 wiped devices, surgical supply chains halted, and cardiac monitoring systems taken ...
Financial institutions remain one of the most aggressively targeted sectors in the global cyber threat landscape. From organized cybercrim...
Geopolitical conflicts increasingly extend beyond traditional battlefields. Today, military escalation is often accompanied by coordinated cyber activity conducted by nation-state actors and affiliated groups seeking to gather intelligence, disrupt adversaries, and position themselves strategically in the global…
“It’s really now about the opportunity to build a cybersecurity program for customers,” shares Rob Stephenson, CEO, Thrive Networks, Inc. In today’s episode of “Sunny’s Silver Linings” podcast, Rob and Sunny chat about the state…
In Part Three of our series, we help organizations identify why IT consulting services are an important part of the return to the office. Over the past few months, we have seen a significant increase…
In this day and age, it’s more important than ever to ensure employees can access company resources in a timely manner. Meanwhile, busines...
The 2021 RSA Conference certainly looked a bit different this year, as top cybersecurity professionals gathered virtually for keynotes, inte...
Digital transformation is not a one-time project, and does not occur overnight. It’s a continuous process that changes as technology evolv...
A managed services provider should be both an innovator and an advisor, helping to set the stage for its clients’ business growth and success. Thrive’s best practices and proven engagement model ensure our clients’ IT…
Incident response planning is an important part of any organization’s cyber security program. Having a proper plan in place ensures smooth communications and quick decision-making in the event of a breach or attack. To facilitate…