Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Cyber attacks have hit 36 per cent of Canadian businesses, study says

August 19, 2014 Author: Category: Greg's Blog

Source: National Cyber Security – Produced By Gregory Evans More than one-third of Canada’s IT professionals know – for sure – that they’d had a significant data breach over the previous 12 months that could put their clients or their organizations at risk, a cybersecurity study suggests. And as […]…

read more

Cloud Security Study Results: Larry Ponemon at the RSA Conference

July 14, 2014 Author: Category: Greg's Blog

In this Smart Enterprise interview, Larry Ponemon, Founder of the Ponemon Institute, shares three lessons learned from a recent cloud security study and disc… ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

read more

Organizations not prepared for advanced cyberthreats, says ISACA study

July 12, 2014 Author: Category: Greg's Blog

Top Priority Sector:  cyber_security ISACA has released a global study showing that one in five organizations (21 percent) have experienced an advanced persistent threat (APT) attack, and 66 percent believe it’s only a matter of time before their enterprise is hit by an APT. Read More…. For more information go to http://www.NationalCyberSecurity.com,…

read more

Virginia Tech engineers study long-term effects of chemicals in West Virginia spill

March 14, 2014 Author: Category: Greg's Blog

Top Priority Sector:  infrastructure_protection Image Caption:  Virginia Tech engineers Read More…. View full post on The Cyber Wars

read more

Technology that could circumvent missile defense systems should face stronger export restrictions, according to study

March 6, 2014 Author: Category: Greg's Blog

John Wagley Top Priority Sector:  military_force_protection A new government-funded View full post on The Cyber Wars

read more

Climate change could boost crime, according to study

February 24, 2014 Author: Category: Greg's Blog

John Wagley Top Priority Sector:  law_enforcement_first_responders It’s not easy to predict crime rates, but a new study has concluded that, based upon certain predictions about climate change, the U. Read More…. View full post on The Cyber Wars

read more

Case Study: Ridley College’s exacqVision open architecture surveillance integrates with existing analog cameras and Keyscan access system

February 13, 2014 Author: Category: Greg's Blog

Top Priority Sector:  video_surveillance_cctv Image Caption:  Julia Bertollo Read More…. View full post on The Cyber Wars

read more

Study: consumers more concerned about business data collection than government surveillance

January 28, 2014 Author: Category: Greg's Blog

John Wagley Top Priority Sector:  it_security When it comes to digital privacy, U. Read More…. View full post on The Cyber Wars

read more

Study: financial institution credit cards more secure than retailer counterparts

January 23, 2014 Author: Category: Greg's Blog

Top Priority Sector:  it_security Financial institution credit cards are more secure than retailer credit cards, according to a new study by View full post on The Cyber Wars

read more

The Center for the Study of Traumatic Stress helps disaster psychiatry become a new field of study

January 20, 2014 Author: Category: Greg's Blog

Ashley Bennett Top Priority Sector:  disaster_preparedness_emergency_response The Center for the Study of Traumatic Stress (CSTS) has pushed “Disaster Psychiatry” to the forefront of the field. Read More…. View full post on The Cyber Wars

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved