Skip to content

Gregory D. Evans

Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Tag: Require

ProtectMyID: Legitimate #sweepstakes don’t require you to pay insurance, taxes, or shipping in advance of claiming your prize. #scamalert #redflag

April 14, 2012 Author: Category: Greg's Blog

ProtectMyID: Legitimate #sweepstakes don’t require you to pay insurance, taxes, or shipping in advance of claiming your prize. #scamalert #redflag View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Senate Bill May Require ‘critical’ Networks to Adopt Cyber Standards

February 14, 2012 Author: Category: Greg's Blog

A bill in the U.S. Senate would require operators of so-called critical infrastructure networks to adopt cybersecurity practices if evaluations by the U.S… View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

EU Data Protection Directive Changes to Require Breach Disclosure Within 24 Hours (January 22 & 23, 2012)

January 25, 2012 Author: Category: Greg's Blog

Proposed changes to the European Union’s Data Protection Directive, which is more than 15 years old, are expected to be announced this week……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Hacker Attacks Like Stratfor’s Require Fast Response

December 30, 2011 Author: Category: Greg's Blog

After a prominent attack on Stratfor, a security group, specialists in computer breaches say companies that are under siege must act quickly to assess and contain the damage. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Mac App Store Will Require Sandboxing Support as of March 1, 2012 (November 3 & 7, 2011)

November 8, 2011 Author: Category: Greg's Blog

Starting next March, applications submitted to be sold through Apple’s Mac App Store must support Apple sandboxing……. View full post on SANS NewsBites View full post on National Cyber Security Gergory Evans

read more

LIGATT: C. Require that every host that connects to this network have a well-configured personal firewall. D. Make a subnet out the wireless network

November 16, 2010 Author: Category: Greg's Blog

LIGATT: C. Require that every host that connects to this network have a well-configured personal firewall. D. Make a subnet out the wireless network View full post on Twitter / LIGATT

read more
Copyright © 2025 Gregory D. Evans. All Rights Reserved.
Screenr parallax theme by FameThemes