Rogue Devices as a Vector for Kinetic Attacks
UPDATE: This blog post was written prior to the USB explosive incident in Ecuador. Some edits have been made to note these events. DISCLAIMER The following blog post describes a […]
UPDATE: This blog post was written prior to the USB explosive incident in Ecuador. Some edits have been made to note these events. DISCLAIMER The following blog post describes a […]
Christopher Emerson was interviewed at this year’s Cyber Security Summit (2019) about the organization and our unique approach to deep-dive penetration testing:
Life is filled with the best of intentions, such as wanting to win the lottery or keep the work emails to a manageable level. Large enterprises have the ability and […]
As my wife recently started an at-home daycare, we have done testing of different child activity tracking applications that provide parents with updates about their child throughout the day (e.g. […]
A number of people had asked for a copy of Christopher’s presentation (Anatomy of a Hack) from the 2019 Secure360 Conference, so we’ve uploaded it here. If anyone has questions […]
In my last post, I talked about some of the reasons that women are leaving the security profession at a much higher rate than men and what needs to change […]
In my last two posts, I talked about how the shortage of security professionals and the fact that women make up only 14% of the U. S. cybersecurity workforce have […]
In my last post, I talked about how the shortage of security professionals and the fact that women make up only 14% of the U. S. cybersecurity workforce have combined […]
According to estimates, there will be a shortage of 2 million cybersecurity professionals worldwide by 2022. At least 500,000 of these jobs are projected to be in the U.S. The […]