The Evolution of Targeted Attacks

Published on July 7th, 2015 | by admin

Once upon a time, the life of a hacker was a simple one. They’d create a virus and push it out to whoever was unlucky enough to pick it up. The Brain boot sector virus, for... Read More


The Why, Where and How of an Advanced Persistent Threat

Published on June 18th, 2015 | by admin

Advanced Persistent Threat or APT has seemingly been the domain of the well-funded hacker, often attributed to government funded and highly organized teams of hackers designed to go after foreign targets. But, just like all technology... Read More

Cyber Security

You Don’t Have to Go it Alone

Published on May 21st, 2015 | by admin

Cybercrime continues to grow and there’s no sign that it will slow down anytime soon. Of all the hacking, including Hacktivism, Cyber Espionage, and Cyber Warfare, Cybercrime eats up the biggest piece of the pie (roughly... Read More

Cyber Security

Moving From Defense to Offense

Published on May 7th, 2015 | by admin

Good sayings get recycled as the years go by. First attributed to Carl von Clausewitz, a Prussian general and military theorist, the saying, “The best defense is a good offense,” has also been associated with Coach... Read More


The Impact of a Cyber Attack

Published on May 5th, 2015 | by admin

Picture this: the IT Security manager of a large company opens the mail his admin assistant just delivered.  One letter addressed to him is from a company he is only peripherally familiar with. The letter states... Read More

Cyber Security

The Weakest Link in the Chain

Published on April 21st, 2015 | by admin

“Just because you’re paranoid doesn’t mean they’re not out to get you.”  While I’m not sure where this quote originated from (it seems several take credit for it), it really does fit with the current trend... Read More

Back to Top ↑