Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Skills development is more than a game—it’s key to management of IT

March 8, 2012 Author: Category: Greg's Blog

Body: The last 10 years have seen a significant change in the information technology business. And I don’t mean the technology—that change is a given. Ten years ago, only the information technology companies had thought in real depth about people’s IT skills, and how to have the right capability in…

read more

FBI Director: Cyber Attacks Could Be Bigger Threat Than Terrorism

March 7, 2012 Author: Category: Greg's Blog

FBI Director Robert Mueller suggested Thursday that cyber-security threats could soon be more of a threat than terrorism. View full post on cyber terrorism – Yahoo! News Search Results View full post on National Cyber Security

read more

Be better than James Bond

March 7, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

ProtectMyID: #Truesday: Business data breaches result in more exposed records than any other type of data breach. T or F?

February 28, 2012 Author: Category: Greg's Blog

ProtectMyID: #Truesday: Business data breaches result in more exposed records than any other type of data breach. T or F? View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Is Apple’s iOS really safer than Android against malware?

February 17, 2012 Author: Category: Greg's Blog

A new study from Juniper finds that Android is the hardest hit by malicious apps but says iOS could be vulnerable as well. Android has gotten a lot of negative buzz for its susceptibility to malware. But a new study from Juniper Networks suggests that iOS could also be at…

read more

ProtectMyID: False. Less than 1/2 of data breaches in 2011 resulted from malice, @ITRC found. What’s going on the rest of the time? http://t.co/TTtKDXGD

February 8, 2012 Author: Category: Greg's Blog

ProtectMyID: False. Less than 1/2 of data breaches in 2011 resulted from malice, @ITRC found. What’s going on the rest of the time? http://t.co/TTtKDXGD View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Data breach harm assessment ‘more important than telling victims’

January 26, 2012 Author: Category: Greg's Blog

IT professionals believe that assessing the potential harm caused by data breaches is more useful to mitigating the effects of such incidents than notifying affected individuals, according to a survey published on the day the European Union’s proposed a 24-hour deadline for data breach disclosures. Entitled “Aftermath of a Data…

read more

Google Plus has more than 90 million users, claims Larry Page

January 23, 2012 Author: Category: Greg's Blog

Google’s social networking platform has had a very encouraging quarter, as CEO Larry Page announced yesterday that Google+ now boasts more than 90 million users worldwide, more than double the number of users it had in the previous quarter. Page also said that engagement on the social networking site has…

read more

Bamboozled: Bank guilty of nothing more than a slow response

January 23, 2012 Author: Category: Greg's Blog

Just what does the law require when someone is turned down for a credit card? View full post on credit report fraud – Yahoo! News Search Results View full post on National Cyber Security

read more

ProtectMyID: #truestory: Muggers get more than the money you’re carrying. Know how to protect yourself if you lose your wallet. http://t.co/3VzGRD98

January 22, 2012 Author: Category: Greg's Blog

ProtectMyID: #truestory: Muggers get more than the money you’re carrying. Know how to protect yourself if you lose your wallet. http://t.co/3VzGRD98 View full post on Twitter / ProtectMyID View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved