Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

SSCC 82 – Sophos Security Threat Report, DMARC and mobile phone number leaks

February 5, 2012 Author: Category: Greg's Blog

This week, Paul Ducklin joins Chet to talk about the Sophos Security Threat Report 2012, the new anti-phishing proposal known as DMARC and mobile phone numbers being leaked through HTTP headers at O2. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Cyber threat might surpass terror threat

February 2, 2012 Author: Category: Greg's Blog

FBI Director Robert Mueller proved CBS Justice and Homeland Security Correspondent Bob Orr's Dec. 25 "Face the Nation" prediction accurate View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

Cyber Threat to Surpass Terror Threat?

January 31, 2012 Author: Category: Greg's Blog

The FBI director testified that cyberthreats will surpass threat of terrorism. View full post on homeland cyber – Yahoo! News Search Results View full post on National Cyber Security

read more

Video: Wash. campus police director talks threat assessment, technology

January 25, 2012 Author: Category: Greg's Blog

Central Washington University in Ellensburg, Wash., sits in the middle of the state, just east of the Cascade Range. The student population is 10,000, about 3,500 of which live on campus. The university police department has 11 commissioned officers. For about two years, the campus has had an Internet-based system…

read more

Hacker group Anonymous is a nuisance, not a threat

January 21, 2012 Author: Category: Greg's Blog

Anonymous has struck again. View full post on anonymous hacker – Yahoo! News Search Results View full post on National Cyber Security

read more

Hackers aren’t the only threat to your computer

January 20, 2012 Author: Category: Greg's Blog

View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security

read more

Join us for the Sophos Security Threat Report webcast January 26th

January 13, 2012 Author: Category: Greg's Blog

Join Chester Wisniewski and James Hilliard for a webcast covering the latest security developments from the second half of 2011 on January 26th, 2012 at 19:00 UTC/2PM Eastern time. View full post on Naked Security – Sophos View full post on National Cyber Security

read more

Microsoft to share valuable real-time threat data feed with security community

January 13, 2012 Author: Category: Greg's Blog

Microsoft is preparing to offer threat intelligence as a real-time feed that companies can use to evaluate threats and develop better defences. A post on the Kaspersky Labs Threat Post blog explains, “Microsoft collects the data by leveraging its huge Internet infrastructure, including a load-balanced, 80gb/second global network, to swallow…

read more

Business under cyber attack threat

January 9, 2012 Author: Category: Greg's Blog

Police warn online attacks are becoming more common in wake of cyber attack that forced ANZ and St George banks to shut down online broking sites. View full post on cyber attack – Yahoo! News Search Results View full post on National Cyber Security

read more

Power Companies Acknowledge Cyber Attack Threat in SEC Filings (December 37, 2011)

January 5, 2012 Author: Category: Greg's Blog

Con Edison of New York is the first utility to describe cyber-attacks as a stand-alone risk category in SEC filings (10Q)……. View full post on SANS NewsBites View full post on National Cyber Security

read more

Posts navigation

Older posts
Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved