Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

ProtectMyID: Legitimate #sweepstakes don’t require you to pay insurance, taxes, or shipping in advance of claiming your prize. #scamalert #redflag

April 14, 2012 Author: Category: Greg's Blog

ProtectMyID: Legitimate #sweepstakes don’t require you to pay insurance, taxes, or shipping in advance of claiming your prize. #scamalert #redflag View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Senate Bill May Require ‘critical’ Networks to Adopt Cyber Standards

February 14, 2012 Author: Category: Greg's Blog

A bill in the U.S. Senate would require operators of so-called critical infrastructure networks to adopt cybersecurity practices if evaluations by the U.S… View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

EU Data Protection Directive Changes to Require Breach Disclosure Within 24 Hours (January 22 & 23, 2012)

January 25, 2012 Author: Category: Greg's Blog

Proposed changes to the European Union’s Data Protection Directive, which is more than 15 years old, are expected to be announced this week……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Hacker Attacks Like Stratfor’s Require Fast Response

December 30, 2011 Author: Category: Greg's Blog

After a prominent attack on Stratfor, a security group, specialists in computer breaches say companies that are under siege must act quickly to assess and contain the damage. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Mac App Store Will Require Sandboxing Support as of March 1, 2012 (November 3 & 7, 2011)

November 8, 2011 Author: Category: Greg's Blog

Starting next March, applications submitted to be sold through Apple’s Mac App Store must support Apple sandboxing……. View full post on SANS NewsBites View full post on National Cyber Security Gergory Evans

read more

LIGATT: C. Require that every host that connects to this network have a well-configured personal firewall. D. Make a subnet out the wireless network

November 16, 2010 Author: Category: Greg's Blog

LIGATT: C. Require that every host that connects to this network have a well-configured personal firewall. D. Make a subnet out the wireless network View full post on Twitter / LIGATT

read more

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved