Research Shows Cybersecurity Monitoring is Needed Behind Network Firewalls

A recent white paper released by a leading firewall company discussed Three (3) Dirty Little Secrets that were discovered about Network Firewalls. It shows the existing weaknesses in firewalls, how companies have become used to network and system infections, and to pushes the need for the newest higher-end firewalls which…

Ten Types of Cyber Attacks Electric Utilities Suffered in 2018

The following synopsis are paraphrased and anonymized for the protection of the utilities and their customers. These are real attacks that have happened since 2016 that were either reported or known to companies like us. The list has been kept to just 10. With these real-life examples, we have tried…

What are the differences between the types of hackers?

According to various definitions you read on-line and in print, there are roughly ten (10) different classifications of Hackers. These can all be found on-line as well as the varying definitions as to what each is. When hiring someone to do Penetration Testing or Vulnerability Testing, most organizations use White…