@guidepointsec (@guidepointsec) 's Twitter Profile
@guidepointsec

@guidepointsec

GuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make informed decisions and minimize risk.

ID: 21878207

linkhttp://www.guidepointsecurity.com calendar_today25-02-2009 15:45:49

4,4K Tweet

2,2K Followers

489 Following

@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Manufacturing continues to be the top target for #ransomware, with attacks climbing again in Q2. Read our new GRIT Ransomware & Cyber Threat Report for more first-hand insights from @guidepointsec's threat analysts: okt.to/mUOufC

@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Identity risks are reshaping the cyber landscape. Join technical leaders from @guidepointsec, Delinea, @PingIdentity & @Saviynt for a special CISO Partner edition of The Brick House. Fresh insights. Candid conversation. Save your seat: okt.to/tW209M

Identity risks are reshaping the cyber landscape.

Join technical leaders from <a href="/GuidePointSec/">@guidepointsec</a>, <a href="/DelineaInc/">Delinea</a>, @PingIdentity &amp; @Saviynt for a special CISO Partner edition of The Brick House.

Fresh insights. Candid conversation.

Save your seat: okt.to/tW209M
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Heading to #DEFCON 33? Don’t miss your chance to connect with @guidepointsec & our vendor partners at our exclusive DEF CON Happy Hour! Reserve your spot: okt.to/T2poAQ

Heading to #DEFCON 33? Don’t miss your chance to connect with <a href="/GuidePointSec/">@guidepointsec</a> &amp; our vendor partners at our exclusive DEF CON Happy Hour!

Reserve your spot: okt.to/T2poAQ
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Not sure where to focus your #CyberResilience efforts? A Business Impact Analysis (BIA) can help you prioritize critical functions, align with NIST and tie security planning to real business risk. Start here: okt.to/26Yd1k

Not sure where to focus your #CyberResilience efforts?

A Business Impact Analysis (BIA) can help you prioritize critical functions, align with NIST and tie security planning to real business risk.

Start here: okt.to/26Yd1k
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Cyber risk is business risk. @guidepointsec's new Cyber Risk Quantification (#CRQ) service helps orgs measure risk in financial terms, prioritize based on impact & make smarter security decisions. Learn more: okt.to/uh6bM7

Cyber risk is business risk.

<a href="/GuidePointSec/">@guidepointsec</a>'s new Cyber Risk Quantification (#CRQ) service helps orgs measure risk in financial terms, prioritize based on impact &amp; make smarter security decisions.

Learn more: okt.to/uh6bM7
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Fragmented app access is a hidden security risk. In this guest blog, F5 shares how improving access consistency across environments can help reduce that risk and strengthen your defenses. Read more: okt.to/DVuGAn

Fragmented app access is a hidden security risk. In this guest blog, <a href="/F5/">F5</a> shares how improving access consistency across environments can help reduce that risk and strengthen your defenses. 

Read more: okt.to/DVuGAn
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Ready to tee off #BlackHat in style?Join @guidepointsec for our annual Black Hat Party, this year at Swingers – The Crazy Golf Club! Expect mini golf, great vibes & even better conversations with security experts and industry partners.  RSVP today: okt.to/QwXqdN

Ready to tee off #BlackHat in style?Join <a href="/GuidePointSec/">@guidepointsec</a> for our annual Black Hat Party, this year at Swingers – The Crazy Golf Club!

Expect mini golf, great vibes &amp; even better conversations with security experts and industry partners. 

RSVP today: okt.to/QwXqdN
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

“How much could this cost us?” Boards and CFOs want answers. Cyber Risk Quantification (#CRQ) gives security teams the financial insight to speak in dollars, not guesses. Learn how CRQ drives smarter decisions: okt.to/MuTyFd

“How much could this cost us?” Boards and CFOs want answers. 

Cyber Risk Quantification (#CRQ) gives security teams the financial insight to speak in dollars, not guesses. Learn how CRQ drives smarter decisions: okt.to/MuTyFd
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Exciting news: @guidepointsec has been named a winner in the Best Solution Provider of the Year category in CRN's inaugural Best of the Channel Awards! Learn more: okt.to/zfeZWm

@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Ransomware tactics are shifting—and so are the threat actors behind them. @guidepointsec analysts break down what changed in Q2 2025 and what defenders need to know. Watch now: okt.to/aeWgth

Ransomware tactics are shifting—and so are the threat actors behind them.

<a href="/GuidePointSec/">@guidepointsec</a> analysts break down what changed in Q2 2025 and what defenders need to know.

Watch now: okt.to/aeWgth
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Identity is under attack, and the numbers prove it. Our latest blog explores the data behind today’s biggest #IdentitySecurity challenges. From common #IAM gaps to the risks they create, we unpack what’s really driving the crisis. Read more: okt.to/pmU2XG

Identity is under attack, and the numbers prove it.

Our latest blog explores the data behind today’s biggest #IdentitySecurity challenges. From common #IAM gaps to the risks they create, we unpack what’s really driving the crisis.

Read more: okt.to/pmU2XG
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Heading to DEF CON? Kick things off with @guidepointsec at our #DEFCON Happy Hour at RedTail inside Resorts World. Enjoy drinks, good conversation and a chance to unwind with fellow attendees. Save your spot: okt.to/MoeBUr

Heading to DEF CON? Kick things off with <a href="/GuidePointSec/">@guidepointsec</a> at our #DEFCON Happy Hour at RedTail inside Resorts World. Enjoy drinks, good conversation and a chance to unwind with fellow attendees.

Save your spot: okt.to/MoeBUr
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

How much risk is your organization willing to accept? In our latest blog, we explore how defining risk appetite can be your key to unlocking smarter #cybersecurity investments. Read more: okt.to/G39MIV

How much risk is your organization willing to accept?

In our latest blog, we explore how defining risk appetite can be your key to unlocking smarter #cybersecurity investments.

Read more: okt.to/G39MIV
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

From Army Officer to #GPSU at @guidepointsec, Taylor Thebarge has brought strategic thinking, curiosity & cyber expertise to the team. In this video, she shares why she pivoted to #cybersecurity after a decade-long military career—and how she’s already making an impact.

@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Identity risk is growing fast—and often outside traditional controls. Experts from @guidepointsec, Daniel Alexander, Ping Identity & Saviynt break down what’s changing and how orgs are adapting. Watch on demand: okt.to/0J9bDA

Identity risk is growing fast—and often outside traditional controls.

Experts from <a href="/GuidePointSec/">@guidepointsec</a>, <a href="/Delinea/">Daniel Alexander</a>, <a href="/pingidentity/">Ping Identity</a> &amp; <a href="/saviynt/">Saviynt</a> break down what’s changing and how orgs are adapting.

Watch on demand: okt.to/0J9bDA
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Cybersecurity and scientific computing share one thing: data. @guidepointsec's Keegan Justis breaks down key takeaways from #SciPy2025 & trends shaping AI-driven security: okt.to/3M0de2

Cybersecurity and scientific computing share one thing: data. <a href="/GuidePointSec/">@guidepointsec</a>'s Keegan Justis breaks down key takeaways from #SciPy2025 &amp; trends shaping AI-driven security: okt.to/3M0de2
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

When ransomware strikes, knowing what to do makes all the difference. @guidepointsec sat down w/azfamily 3TV CBS 5 to discuss how we help businesses navigate #ransomware attacks—from containing the breach to negotiating with threat actors. Watch now: okt.to/yk3mCr

When ransomware strikes, knowing what to do makes all the difference.

<a href="/GuidePointSec/">@guidepointsec</a> sat down w/<a href="/azfamily/">azfamily 3TV CBS 5</a> to discuss how we help businesses navigate #ransomware attacks—from containing the breach to negotiating with threat actors.

Watch now: okt.to/yk3mCr
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Today, we honor 234 years of dedication, bravery and service by the United States Coast Guard. Happy Birthday #USCG—and thank you to all who have served.

Today, we honor 234 years of dedication, bravery and service by the United States Coast Guard.

Happy Birthday #USCG—and thank you to all who have served.
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

Why do attackers still target on-prem #ActiveDirectory—and how can you reduce risk? We break down common gaps and how to harden your AD environment in a new blog: okt.to/e0tS9j

Why do attackers still target on-prem #ActiveDirectory—and how can you reduce risk?

We break down common gaps and how to harden your AD environment in a new blog: okt.to/e0tS9j
@guidepointsec (@guidepointsec) 's Twitter Profile Photo

New from @guidepointsec GRIT: Akira ransomware actors are repeatedly exploiting two drivers after SonicWall VPN access—pointing to a clear pattern. These findings can help defenders detect early signs before #ransomware hits. Learn more: okt.to/wb9ucg

New from <a href="/GuidePointSec/">@guidepointsec</a> GRIT: Akira ransomware actors are repeatedly exploiting two drivers after SonicWall VPN access—pointing to a clear pattern.

These findings can help defenders detect early signs before #ransomware hits.

Learn more: okt.to/wb9ucg