Cyber Security Articles & News

How Technology is Changing the Future of Social Engineering

Social engineering is not a new concept; in fact, it was said to have originated in 1184 BC with the legendary tale of the Trojan Horse. But since the evolution of technology, we've come a long way from hiding in wooden horses…

Read More >
The Main Types of Ransomware & How to Spot the Difference

Ransomware attacks have been flooding the news over the last few years— and in this past year especially. 

Read More »
5 Benefits of Virtual Cyber Security Events that In-Person Events Don't Offer

If you are looking to book a cyber security speaker, there’s a strong chance you are considering a digital broadcast. After all, the COVID-19 pandemic has made it nearly impossible for event planners to host in-person events. 

Read More »
Social Engineering Terms Explained (with Examples!)

You’ve been told you need social engineering training, but as soon as you start researching what social engineering is, you’re hit with all these confusing terms and abbreviations.

Read More »
An Overview of Kaseya: The “Biggest Ransomware Attack on Record”

If the year 2021 was a cyberattack, we’d have to crown it, “The King of Ransomware.” That’s because this past year has been downright riddled with cybercriminals demanding a ransom to unlock seized systems.

Read More »
5 Reasons to Enable Company-Wide Multi-Factor Authentication

Are you only using multi-factor authentication (MFA) because you've been told over and over that you need to? If you are, you’re not alone. Many organizations adopt an MFA policy to be more secure, yet are still unsure as to how it works and why their company needs it so badly.

Read More »
6 Questions to Ask Before Beginning Red Team Pentesting

If you’ve conducted a few successful penetration tests already, you may be wondering, “what’s next?”

Read More »
How to Prepare for Penetration Testing

Whether you’re conducting your organization’s very first penetration test or are simply getting your assets in order, it’s smart to understand everything that goes into preparing for the engagement.

Read More »
What is Red Team Pentesting?

If your company has invested in many penetration tests, you’re probably looking for more advanced ways of examining your security infrastructure. 

Read More »
An Inside Look Into Kevin Mitnick's Live Hacking Demonstrations

To be frank, a lot of cyber security presentations are, well… dull. 

Read More »