Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Terrorism monitor closely watched Occupy protests

April 10, 2012 Author: Category: Greg's Blog

CSIS says surveillance was used ‘to assess the potential for politically motivated violence’ View full post on cyber terrorism – Yahoo! News Search Results View full post on National Cyber Security

read more

Palo Alto WildFire firewall upgrade closely inspects network traffic

November 9, 2011 Author: Category: Greg's Blog

Palo Alto Networks is upgrading its firewall products with a capability to precisely identify outbound traffic generated by malware, which the company calls WilfFire and says will help if the malware is undetected at first and starts running on a computer. WildFire will be distributed as a free upgrade for…

read more

Duqu May Not Be as Closely Linked to Stuxnet as First Thought (October 26 & 27, 2011)

November 2, 2011 Author: Category: Greg's Blog

Computers infected with Duqu malware have been detected in Iran and Sudan……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Spy parents: Mom and dad have to decide how closely they want to monitor kids

September 6, 2011 Author: Category: Greg's Blog

Spy parents: Mom and dad have to decide how closely they want to monitor kids By David CraryMonday, September 5, 2011 6:40 PM CDT AP National Writer NEW YORK (AP) — In the 21st century, parenthood and paranoia often walk hand in hand. For some, the blessed event is followed…

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved