April 16, 2020: Law Firms, Securing Your Cloud and Your Data

Since we are all stuck working from home Ice Miller, Profile Discovery and Agile1 are presenting an exciting CyberSecurity webinar for Law Firms on Securing Your Cloud and Your Data. We promise to be done with this Webinar in about 35-45 minutes and we will cover the...
Top FOUR Methods to be Used by Hackers in the Roaring 2020’s

Top FOUR Methods to be Used by Hackers in the Roaring 2020’s

The New Year will usher in the Roaring 2020’s and we all expect to see an big increase in malicious Cyber events because our external attack surface is growing as everyone’s business digitizes.   Security teams and their budgets will continue to...
Black Hat 2019: Highlights from the Biggest and Best Yet

Black Hat 2019: Highlights from the Biggest and Best Yet

This was sourced from Hackerone: https://bit.ly/2U7v2rv Black Hat 2019 was the biggest and best yet. Over 20,000 attendees heated up Las Vegas with provocative training sessions, innovative presentations, and record-breaking live hacking events. At booth 1330, we had...
Top FOUR Methods to be Used by Hackers in the Roaring 2020’s

12 reasons why data breaches still happen

Half of IT security leaders don’t know if their cybersecurity tools are working, according to a report from the Ponemon Institute and AttackIQ. When asked why data breaches still happen, despite investments in cybersecurity technologies, IT and security...
2 Cyber Security Articles Worth Reading

2 Cyber Security Articles Worth Reading

Pick #1: Cyber Attacks reported in the UK financial service sector went up 1,000 percent since 2017, with third-party failures involved in 21 percent of incidents. Cyber Criminals are coming for API’s and weak counter parties SC MEDIA has an interesting article...