Cyber Security Articles & News

WATCH: How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick

Qualys Presentation at RSA Conference 2017

Read More >
EVENT REVIEW: Tales from the Darkside: Kevin Mitnick, HostingCon 2017 Keynote

Most of us are aware that there are people trying to steal our personal information and identities, but are we aware of the easiest ways for these people to get it? No.

Read More »
BOOK REVIEW: What’s In Your Library?

You know what I’m thankful for? Target.  Where else are you going to find a 6 shelf, 80 inch bookcase for $35?  Sure, it’s made of cheap wood and sways I bit if I bump into it, but hell… I gotta display my excessive collection of books some how.  If I’m going to spend a ridiculous sum of money on acquiring and preserving a handwritten civil war memoir, I want people to appreciate it.

Read More »
Meet six of the most effective social engineering techniques

And what to do to stop being so used by cybercriminals

Read More »
BOOK REVIEW: The Art of Invisibility by Kevin Mitnick

I was fortunate enough to meet the author, Kevin Mitnick, while attending RSA in February. I was given a signed copy of The Art of Invisibility, one of The State Security’s must-reads for infosec pros, so I made it a point to read the book.

Read More »
EVENT REVIEW: This Hacker Can Talk His Way inside a Data Center

When a credit bureau hired Kevin Mitnick’s company to test its security defenses, he went straight for the crown jewels. He decided he would try to get inside the bureau’s data center, physically, on his own two feet.

Read More »
The five steps for managing cyber security threats

Cyber security is a people problem more than a technology problem. A single compromised employee, whether malicious or negligent, can render the best systems worthless.

Read More »
BOOK REVIEW: The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small thing that could leave a crack in the wall. But hackers are persistent, and they’ll keep trying until they finally find the vulnerability you overlooked. “The adage is true that the security systems have to win every time, the attacker has to win once” says Dustin Dykes; a security consultant interviewed in the book by Kevin Mitnick.  

Read More »
Hacker: The First, the Best, and the Most Feared Hackers of All Time

Hackers may be classified into three, the black hat, gray hat, and the white hat hacker. However, society is more interested in the black hat, mainly because of their impact on the cyber world.

Read More »
SEE LIVE: Red Sky Security Conference 2017

Event in Sandy
9575 S State St,Sandy
Wednesday 10 May 2017, 08:00 till Wednesday 10 May 2017, 17:00
Organized by : Red Sky Solutions

Read More »