Cyber Security Articles & News

Pros and Cons of Vulnerability Scanning vs Penetration Testing

When it comes to an organization’s cybersecurity, vulnerability scanning and penetration testing can protect your business from threat actors. But what are the differences, and when should you use one over the other?

Read More >
What Are the Biggest Cyber Security Threats to Your Business?

Cyber security threats can come in multiple forms. Recently, ABC News reported that threat actors accessed user account information from Facebook’s parent company Meta by pretending to be law enforcement officials. This cyber attack — a form of social engineering — although surprising, was not unprecedented. 

Read More »
Why Did Kevin Mitnick Become a Hacker?

The king of computer hacking and information security, Kevin Mitnick, is a name that instills curiosity — and sometimes terror — into the minds of many within the world of technology.

Read More »
Hacker Security 101: How To Protect Yourself

In March 2022, tools manufacturer Snap-On admitted to a serious data breach that left personal information exposed including names, birth dates, social security numbers, and employee ID numbers. Perhaps the scariest part of this cybersecurity attack is that the attack type was never disclosed to the public. 

Read More »
How To Book a Cybersecurity Speaker for Your Event

Any cybersecurity event — in-person or virtual — is only “worth it” if the audience is engaged and comes out of the event with the knowledge and power to improve the security posture of your organization. 

Read More »
What Is a Social Engineering Attack?

Most organizations use security scans to protect their data and employees from threat actors, however, a simple scan may not be updated or thorough enough to catch everything. Additionally, a scan doesn’t account for one major vulnerability within an organization: its employees. 

Read More »
5 of the Best Cybersecurity Books

Cybersecurity can be defined as the ways in which an organization protects itself against unauthorized access or unauthorized use of the organization’s network, private data, or assets. When organizations suffer data breaches and compromised systems at the hands of threat actors, they often look for ways to improve their cybersecurity posture, and cyber security books are a great way to do this.

Read More »
Cost-Benefit Analysis of Virtual Versus In-Person Events

Hosting a cybersecurity event can not only empower your team, but it can also strengthen the posture of your organization. The real choice isn’t if you should host an event — you definitely should — but how to host it. Cyber security events can be a virtual event experience or in-person, and there are several speakers you can hire for either option. 

Read More »
3 Facts About Kevin Mitnick & the Global Ghost Team

Kevin Mitnick and his team of penetration testers, called the Global Ghost Team, are known for helping organizations find weaknesses within their cybersecurity framework through penetration testing. Kevin is a trusted security consultant to Fortune 500 companies and governments worldwide. 

Read More »
How the Free Kevin Movement Changed the Cyber Security Industry

Kevin Mitnick’s journey to notoriety started when he was a kid playing pranks by changing telephone numbers. However, he didn’t catch the attention of the world until he tested his skills in deeper, more dangerous waters — just to see if he could. 

Read More »