Cyber Security Articles & News

Cost-Benefit Analysis of Virtual Versus In-Person Events

Hosting a cybersecurity event can not only empower your team, but it can also strengthen the posture of your organization. The real choice isn’t if you should host an event — you definitely should — but how to host it. Cyber security events can be a virtual event experience or in-person, and there are several speakers you can hire for either option. 

Read More >
What is a Pentest Framework?

Penetration tests are performed by cybersecurity companies to help find weaknesses in an organization's network, in internal systems, and show that organization how threat actors can exploit those vulnerabilities. 

Read More »
3 Facts About Kevin Mitnick & the Global Ghost Team

Kevin Mitnick and his team of penetration testers, called the Global Ghost Team, are known for helping organizations find weaknesses within their cybersecurity framework through penetration testing. Kevin is a trusted security consultant to Fortune 500 companies and governments worldwide. 

Read More »
How the Free Kevin Movement Changed the Cyber Security Industry

Kevin Mitnick’s journey to notoriety started when he was a kid playing pranks by changing telephone numbers. However, he didn’t catch the attention of the world until he tested his skills in deeper, more dangerous waters — just to see if he could. 

Read More »
Are Social Engineering Attacks on the Rise?

The short answer is: YES. Social engineering attacks are on the rise, and these attacks from bad actors could threaten your organization. 

Read More »
What is Product Claims Testing?

When it comes to protecting your organization, it is important to have full confidence in the products you sell or the services you purchase. Unfortunately, the cyber security industry is overflowing with companies that market products by grossly overstating their cyber threat detection capabilities.

Read More »
What Is Included in a Vulnerability Assessment Report?

To keep bad actors at bay, most businesses will have their system software regularly scanned for high-level security vulnerabilities. Sometimes after a scan, a cyber security professional assesses the results. These professionals often weed out false positives and offer recommendations for improving your defenses in the form of a vulnerability assessment report (VA report).   

Read More »
4 Ways To Make Your Cyber Security Virtual Event Feel Like It’s an In-Person Experience

Surrounded by the ever-changing state of business operations, planning a cyber security training or educational event can be complicated. One of the challenges you’ll face early on is deciding whether or not to host your next cyber security event in-person. Many individuals fear that a virtual cybersecurity presentation could never be as engaging as an event that’s face-to-face. 

Read More »
Times Your Company May Need a Cyber Security Expert Witness

Expert witnesses are commonplace in the legal world to provide well…expert… insight into cyber scenarios. Because the Average Joe may not know the technical terms of computer forensics or best practices of cyber security, a professional is often necessary to skillfully relay reliable information to all relevant parties. 

Read More »
What Is a Security Vulnerability Assessment?

When it comes to online security, you want to find the issues before cyber criminals figure it out for you. Penetration tests, or pentests, are annual tests that use social engineering and other rigorous testing methods to find exploitable vulnerabilities in your systems. However, what about the months, or years, in between full-scale pentests?

Read More »