Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Exec order on Cyber security coming, might include information sharing

September 25, 2012 Author: Category: Greg's Blog

Mark Rockwell Top Priority Sector:  cyber_security Image Caption:  White House meeting As congress recesses for the national election, the White House is close to issuing an Executive Order on Cyber security in the coming days that could include information sharing measures for infrastructure providers, according to reports. Homepage position:  10…

read more

America’s Draft Cybersecurity Executive Order LEAKED

September 15, 2012 Author: Category: Greg's Blog

This week a document from the white house has been leaked which is a draft outlining the Cyber security for its critical sectors. View full post on Cyber War News View full post on The Cyber Wars

read more

Dragon Family Order Anonymous Illuminati Death Vid

July 18, 2012 Author: Category: Greg's Blog

Dragon Family Order Anonymous Illuminati Death Vid View full post on The Cyber Wars

read more

Obama executive order on emergency communications riles privacy group

July 11, 2012 Author: Category: Greg's Blog

An executive order issued by the White House last Friday seeks to bolster the government’s ability to keep its emergency communications capabilities intact during national emergencies. But one privacy advocacy group expressed concern that the order gives government unprecedented new authority to take over wired and wireless private communication networks…

read more

Analysis: Conflicting forces of cyber law and order

April 19, 2012 Author: Category: Greg's Blog

New EU initiatives may duplicate, or even undermine, efforts to protect the UK’s financial services industry from cyber crime. And as Sooraj Shah and Andrew Charlesworth report, this is the last thing the sector needs View full post on cyber crime hacking – Yahoo! News Search Results View full post…

read more

Australia to Seek Court Order Against iPad’s ’4G’ Label

March 28, 2012 Author: Category: Greg's Blog

The Australian Competition and Consumer Commission said Apple is violating the Australian Consumer Law by misleadingly labeling its new iPad as 4G-capable, and it will try to get a court to impose fines and an injunction against sales. The commission will apply to the Federal Court in Melbourne for orders…

read more

Judge: Order to Decrypt Laptop Does Not Violate Fifth Amendment

January 24, 2012 Author: Category: Greg's Blog

A Colorado judge this week ordered a woman to decrypt her laptop so that law enforcement officials could use the information against her in a pending fraud case. “I find and conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite…

read more

ProtectMyID: Don’t write or print private info, such as your #ssn or #driverslicence number, when you write or order checks #101tips

October 27, 2011 Author: Category: Greg's Blog

ProtectMyID: Don’t write or print private info, such as your #ssn or #driverslicence number, when you write or order checks #101tips View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

ProtectMyID: True. Criminals target outgoing mail in order to steal personal checks.

October 25, 2011 Author: Category: Greg's Blog

ProtectMyID: True. Criminals target outgoing mail in order to steal personal checks. View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

DOJ Used Secret Court Order to Obtain Data in WikiLeaks Investigation (October 10, 2011)

October 14, 2011 Author: Category: Greg's Blog

The US Justice Department’s (DOJ) obtained secret court orders to gain to information about the accounts of former WikiLeaks spokesman Jacob Appelbaum from Google and Internet service provider (ISP) Sonic……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved