The Human Vulnerability Scan

The Human Vulnerability Scan Is a hacker more likely to perform elaborate attacks that require slow stealth scans, creation of custom scripts, and metered brute forcing attempts? Or is it more likely that they search for the easiest and quickest way to get the data they are after without being noticed? Absolutely, elaborate attacks are carried out daily, but the …

Cyber Security

PROTECTING YOUR DIGITAL GOLDEN EGG

PROTECTING YOUR DIGITAL GOLDEN EGG Maybe the recent hack of Yahoo! has made you change your mind about how you incorporate security at your place of business. Maybe you have known security is important all along, but there was no financial way you could implement it how you really need to. The question we hear again and again as consultants, …

What Can a SIEM Solution Do for Your Business?

Protecting your company from the threat of a cyber-attack can be a tough task to grapple these days. This is especially difficult for businesses in the small to medium sized category, who don’t necessarily have expendable resources like their larger counterparts. However, data breaches continue at an alarming rate each year, and ransomware and crypto locker attacks generated nearly a …

cloud hacking

i h4cked the Cl0ud

This is right! I did it! I Hacked the Cloud….. It was really difficult as there were a lot of motion monitoring heat sensors and Lasers that I had to breach before I could move into the cloud environment. As a matter of fact, I had to use all my ninja stars, google-fu, and unicorn dust in order to achieve …

Alias Forensics Security

Intrusion Prevention Systems(IPS) Vs. Intrusion Detection Systems(IDS)

Stephen Hawking once said, “We are all now connected by the Internet, like neurons in a giant brain.” When it comes to explaining how certain technology works, organs of the body make for great metaphors. They are equally, if not more complex than current technology, yet common enough (we all have them!) for most people to relate. To me, information …