Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Cold War 2.0: East and West divide on digital rights

February 6, 2012 Author: Category: Greg's Blog

Disagreements on how to manage intellectual property theft, Internet freedom between U.S., allies and Russia, China View full post on russia cyber attacks – Yahoo! News Search Results View full post on National Cyber Security

read more

North East News: Cramlington computer expert concealed child porn addiction

January 22, 2012 Author: Category: Greg's Blog

Jan 22 2012 by Michael Brown, Sunday Sun AN IT expert at a North council used his computer knowledge to conceal a child and bestiality porn addiction in one of the most sophisticated ways police have ever seen. Gary Storey created a “virtual computer” – a hidden section – on…

read more

2011-12-05 – SANS Institute to Debut New Cloud Security Course at SANS Security East 2012

December 5, 2011 Author: Category: Greg's Blog

SANS Institute to Debut New Cloud Security Course at SANS Security East 2012 View full post on SANS Press Room View full post on National Cyber Security

read more

Cisco Voice Engineer- Consulting roles in US-Midwest, Texas, and East Coast

November 26, 2011 Author: Category: Greg's Blog

CISCO VOICE ENGINEERS – Midwest, East Coast, Texas Our customer is a leading systems integrator looking to hire several Voice Engineers located in the Midwest, Texas, or the Eastern Coast. Qualified candidates will have 5 to 7 years of hands-on Cisco experience and need to specialize in voice technologies and…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved