Blog

50 Results / Page 3 of 6

Background
How private digital forensics can uncover more in investigations

todayAugust 14, 2025

close

Blog Alias

What to Do When Law Enforcement Doesn’t Provide Answers: The Role of Private Digital Forensics in Your Case

When a law enforcement agency (LEA) investigates an incident—whether it’s a suspicious death, a cybercrime, or an allegation involving digital forensics evidence—families, defendants, or legal teams often expect transparency, thoroughness, and timely communication. Unfortunately, that’s not always the case. Many people experience frustration when investigations appear incomplete or when key ...

Incident Response: Your guide to the cybersecurity championship

todayJuly 17, 2025

close

Blog Donovan Farrow

Incident Response: Your Guide to the Cybersecurity Championship 

Warning: What follows is an example of a real-life ransomware attack and the resulting incident response. Picture this: you’re cruising through your usual workday, coffee in hand, inbox under control, when suddenly ring! ring! you get a call from a co-worker. They can’t access a file on the shared drive. ...

Deepfake rising in social engineering

todayJuly 10, 2025

close

Blog Alias

Your CEO Just Called (or Did They?): Deepfake Usage in Social Engineering

The Alarming Reality of Voice and Video Impersonation Attacks In an increasingly digital world, the lines between what’s real and what’s fake are blurring at an alarming rate. One striking example is deepfake scams—a sophisticated form of artificial intelligence that can create highly convincing artificial media. Initially, these tools entertained us with celebrity ...

CISO Business Alignment

todayJuly 1, 2025

close

Blog Jonathan Kimmitt

Security Leadership: The CISO Doesn’t Need to Know the Business—They Need to Know the People Who Do (Part 3)

Note: The Following is the third part of a series on CISO/Security Leadership. Click here for Part One: CISO Soft Skills Matter More Than Ever and here for Part Two: What Separates Security Practitioners from Security Leadership? Over the years, a common refrain has echoed through cybersecurity leadership circles: “The CISO ...

What is MDR

todayJune 24, 2025

close

Blog Andrew Hickman

What is MDR? A 2025 Guide to Managed Detection and Response

If you’re wondering what Managed Detection and Response (MDR) is and whether it’s right for your organization, you’re not alone. Cybersecurity is a 24/7 battle against relentless threats, and keeping up can feel overwhelming. From ransomware that locks up your data to phishing emails that trick employees, the risks are ...

CISO soft skills matter more than ever

todayJune 11, 2025

close

Blog Jonathan Kimmitt

Security Leadership: CISO Soft Skills Matter More Than Ever (Part 1)

When people think of a Chief Information Security Officer (CISO), they often picture someone deeply technical — an expert in threats, tools, and frameworks. While technical acumen is certainly important, the secret to success in the CISO role often lies somewhere less obvious: soft skills. In fact, a CISO’s ability ...

todayMay 29, 2025

close

Blog Alias

Alias Cybersecurity Selected to Compete in Prestigious Vishing Competition at DEFCON 33

FOR IMMEDIATE RELEASE Alias Cybersecurity Selected to Compete in Prestigious Vishing Competition at DEFCON 33 Oklahoma City, OK – May 29, 2025— Alias Cybersecurity is proud to announce that our team (codenamed #DoppelDudes”) has been selected to participate in the highly competitive Social Engineering Community Vishing Competition (SECVC) at DEFCON 33, one of ...