Cyber Security Articles & News

How To Book a Cybersecurity Speaker for Your Event

Any cybersecurity event — in-person or virtual — is only “worth it” if the audience is engaged and comes out of the event with the knowledge and power to improve the security posture of your organization. 

Read More >
What Is a Social Engineering Attack?

Most organizations use security scans to protect their data and employees from threat actors, however, a simple scan may not be updated or thorough enough to catch everything. Additionally, a scan doesn’t account for one major vulnerability within an organization: its employees. 

Read More »
5 of the Best Cybersecurity Books

Cybersecurity can be defined as the ways in which an organization protects itself against unauthorized access or unauthorized use of the organization’s network, private data, or assets. When organizations suffer data breaches and compromised systems at the hands of threat actors, they often look for ways to improve their cybersecurity posture, and cyber security books are a great way to do this.

Read More »
Cost-Benefit Analysis of Virtual Versus In-Person Events

Hosting a cybersecurity event can not only empower your team, but it can also strengthen the posture of your organization. The real choice isn’t if you should host an event — you definitely should — but how to host it. Cyber security events can be a virtual event experience or in-person, and there are several speakers you can hire for either option. 

Read More »
3 Facts About Kevin Mitnick & the Global Ghost Team

Kevin Mitnick and his team of penetration testers, called the Global Ghost Team, are known for helping organizations find weaknesses within their cybersecurity framework through penetration testing. Kevin is a trusted security consultant to Fortune 500 companies and governments worldwide. 

Read More »
How the Free Kevin Movement Changed the Cyber Security Industry

Kevin Mitnick’s journey to notoriety started when he was a kid playing pranks by changing telephone numbers. However, he didn’t catch the attention of the world until he tested his skills in deeper, more dangerous waters — just to see if he could. 

Read More »
Are Social Engineering Attacks on the Rise?

The short answer is: YES. Social engineering attacks are on the rise, and these attacks from bad actors could threaten your organization. 

Read More »
What is Product Claims Testing?

When it comes to protecting your organization, it is important to have full confidence in the products you sell or the services you purchase. Unfortunately, the cyber security industry is overflowing with companies that market products by grossly overstating their cyber threat detection capabilities.

Read More »
What Is Included in a Vulnerability Assessment Report?

To keep bad actors at bay, most businesses will have their system software regularly scanned for high-level security vulnerabilities. Sometimes after a scan, a cyber security professional assesses the results. These professionals often weed out false positives and offer recommendations for improving your defenses in the form of a vulnerability assessment report (VA report).   

Read More »
4 Ways To Make Your Cyber Security Virtual Event Feel Like It’s an In-Person Experience

Surrounded by the ever-changing state of business operations, planning a cyber security training or educational event can be complicated. One of the challenges you’ll face early on is deciding whether or not to host your next cyber security event in-person. Many individuals fear that a virtual cybersecurity presentation could never be as engaging as an event that’s face-to-face. 

Read More »