Breach

September 6, 2018
Social Engineering Part 3: Phishing

If you survey your co-workers, chances are high you will find they have received a phishing email at some point....

Read More
August 15, 2018
Social Engineering Part 2: Open-Source Intelligence (OSINT)

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often...

Read More
July 5, 2018
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization

Firewalls, encryption, antivirus software, armed security guards, dual authentication and every other added security mechanism that exists to secure data,...

Read More
May 9, 2018
Conducting and Detecting Data Exfiltration

Is your organization taking proactive measures to prevent a data breach?  From 2016 to 2017, the number of data breaches...

Read More
April 3, 2018
CloudFront Hijacking

I recently spent some time exploring the issue of CloudFront domain hijacking. This is not a new issue but I...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 7, 2016
Voter Privacy vs. the Security of the Electronic Voting System

As technology continues to permeate every facet of life, individuals are continuously faced with decisions that test the balance between...

Read More
November 3, 2016
Open or Closed: The Data on Your Mobile Device is Still Accessible

Ten years ago, the biggest concern we had regarding our mobile phone was losing it (or worse, having it stolen)....

Read More
October 27, 2016
When Perception is Not Reality: Perspectives on State-Sponsored Hacking and Retaliation

NBC News recently reported that the CIA is poised to launch a retaliatory cyber-attack against Russian computer systems. This comes...

Read More
October 6, 2016
BCDR Series: The intersection of Incident Response and Business Continuity

When most people think of Continuity, they think of bringing a business back online after a fire or a flood....

Read More
August 25, 2016
So You’re Going Back to School – Can You Pass the Identity Security Test?

With summer coming to an end, college students are preparing for the new school year to start. In our ever...

Read More
August 5, 2016
Hacking Hillary: Recent Breaches against Democratic Political Groups

A recent leak of thousands of Democratic National Committee emails cast a long shadow over the Democratic Convention in Philadelphia...

Read More
12