
Black Hat 2019
Black Hat 2019 is over. The event which takes place annually for the last 22 years, in Las Vegas, NV, hosted around 20,000 cyber security professionals this year. The day after Black Hat wraps up, the Def Con event takes place. Just to give you an idea of how Black...What edition are we playing again?
Think back to when you were a kid, and the games you might have played, take a moment and think about your favorite game. If you were like the majority of us who were nerdy children who grew up to be interested in cybersecurity, you probably took part in some of the...
IT Disaster Recovery: Practice Makes Perfect
Testing your technology disaster recovery plan at regular intervals will help ensure that you’re ready for the next crisis. Automated testing is an important aspect of regular testing; however, also testing the people-dependent elements of your plan is the only way to...
Cyber Security Stories That Will Keep You Up At Night
It is a mistake to fancy that horror is associated inextricably with darkness, silence, and solitude. H. P. Lovecraft “They’re here.” “Who’s here?” “Bad Actors…” Cybersecurity horror stories, they don’t just occur, during Halloween, on a dark and stormy night,...