Archive for 57828255


1. Your own security team is overworked and can’t get to it.
2. You want an objective, 3rd party view of how vulnerable your organization is to cyber threats.
3. You want to know how diligent the security efforts are of a prospective supplier, merger partner, or acquisition target before you provide them access to your network.
4. You want to avoid the downtime, forensic analysis, loss of reputation, and potential lawsuit that could come from data security negligence.
5. You want an advantage over key competitors.

Make Sure You Delete All Data from Unused Phones, Tablets, Laptops, or Computers

How PayPal is Being Used for Phishing Scams

Understanding Vulnerability Scoring and How to Differentiate Vulnerability From Risk

Business Email Compromise Attacks are Moving to Mobile Devices

Extending Wireless Networking to Cars Creates New Cyber Risks

UT Dallas Cybersecurity 2019 Kickoff Event

UTD Cybersecurity Invite

Many thanks to UT Dallas for inviting me to speak at their 2019 Cybersecurity Kickoff event. Graduates from cybersecurity programs like UTD’s are helping to close the skills gap, which is expected to reach 3.5M open positions by 2021.

Cyber Attack Trends in 2018

Cyber attack trends in 2018

The Top 10 Most Common Types of Cyber Attacks

The Top 10 Most Common Types of Cyber Attacks

What is Blockchain? A Step by Step Guide for Beginners

A step by step guide to blockchain