Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

The H Factor – Why you should be building “human firewalls”

September 5, 2016 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans It is often the illusive “H Factor” – the human element – that ends up being the weakest link that makes cyber-attacks and data breaches possible. It is often the illusive “H Factor” – the human element – that ends The…

read more

US firms over-reliant on firewalls to defend against DDoS attacks

May 16, 2012 Author: Category: Greg's Blog

More than half of US businesses still rely on conventional firewalls or intrusion prevention systems to shield them from the scourge of DDoS attacks, a survey by services firm Neustar has found. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking

read more

How to test a firewall: A three-step guide for testing firewalls

April 11, 2012 Author: Category: Greg's Blog

There are three steps when testing firewalls for your organization. Expert Joel Snyder explains how to test a firewall. View full post on SearchSecurity: Network Security Tactics View full post on National Cyber Security

read more

ProtectMyID: Firewalls keep other computers from accessing your computer information while connected to the Internet. Do you have firewall protection?

February 27, 2012 Author: Category: Greg's Blog

ProtectMyID: Firewalls keep other computers from accessing your computer information while connected to the Internet. Do you have firewall protection? View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Firewalls fail to stem tide of DDoS attacks, survey finds

November 10, 2011 Author: Category: Greg's Blog

Companies still rely heavily on firewalls to defend themselves against denial-of-service attacks despite the fact that this class of device is often not up to the task, a new survey by F5 Networks has found. The survey of 1,000 medium and large organisations in 10 countries found that up to…

read more

Palo Alto gives firewalls a cloud-based anti-malware sandbox with WildFire

November 7, 2011 Author: Category: Greg's Blog

Network security company Palo Alto Networks on Monday introduced a new anti-malware product for on-premises firewalls known as WildFire, which vets new and unknown files in a virtual sandbox to see if they’re a new piece of malware, and then creates a distributable signature if they’re determined to actually be…

read more

Palo Alto gives firewalls a cloud-based anti-malware sandbox with WildFire

November 7, 2011 Author: Category: Greg's Blog

Network security company Palo Alto Networks on Monday introduced a new anti-malware product for on-premises firewalls known as WildFire, which vets new and unknown files in a virtual sandbox to see if they’re a new piece of malware, and then creates a distributable signature if they’re determined to actually be…

read more

It takes two to tango and two firewalls to secure your system

October 4, 2011 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

LIGATT: Which of the following types of firewalls would be the best for an organization if performance were the chief requirement?

November 24, 2010 Author: Category: Greg's Blog

LIGATT: Which of the following types of firewalls would be the best for an organization if performance were the chief requirement? View full post on Twitter / LIGATT

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved