Blog

15 Results / Page 2 of 2

Background

todayDecember 17, 2021

  • 417
  • 3
close

Blog Alias

L33T or Lame: A Hacker Tool Review

“Top 10 Gifts for the Hacker in Your life” articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile?  We recently sat down with two of our security engineers to talk about different gadgets and tools of the trade on this week’s ...

todayDecember 14, 2021

  • 1385
  • 3
close

Blog Alias

Hacking the Holiday: A Hacker’s Gift Guide

Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any hacker in your life. Just click on the images or the titles for a direct link to the amazon listing. ...

blue and purple gradient

todayOctober 14, 2020

  • 221
  • 3
close

Blog Alias

Learn to prevent and respond to ransomware

Ransomware has been a problem since 1989, and it’s not getting better. In fact, every eleven to fourteen seconds, a new company falls victim to this problem. Ransomware costs organizations around $20-Billion annually. But it’s not just a company problem, individuals fall victim to this threat as well. You need ...

blue and purple gradient

todayAugust 25, 2020

  • 581
  • 4
close

Blog Alias

What is digital forensics? Your new fingerprint.

When you think forensics, you probably imagine fingerprint and blood sample analysis. Which is pretty close to what digital forensics is. Change out the fingerprint for a computer and you’ve basically got it. Digital forensics is the scientific approach to performing data recovery and analysis of a digital device. A ...

blue and purple gradient

todayAugust 17, 2020

  • 277
  • 3
close

Blog Alias

Why Your Business Needs Cyber Security Awareness Training

Ever wonder if you should bother with the cost and time needed for security awareness training? Some industries are legally required to host security awareness training (like banking); but quite a few industries aren’t required to have employee training. Here are a few reasons why you should host cyber security ...