A conversation with principal security consultant Amit Bagree. I had the opportunity recently to sit down with Amit Bagree, one of our principal security consultants, for a chat about the most common weak points in network security. Amit has been breaking things apart since childhood, has been working in the security field for almost 10 […]

Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money. The fact that two-thirds of all the emails out there on this planet are phishy tells me […]

The parade of breaches, attacks and various other digital maladies hitting corporations in 2014 made it clear that default, out-of-the-box compliance and security isn’t enough to protect organizations. But the nature of advanced persistent threats (APTs), and other forms of malware, makes it difficult to find an investment that can keep the next threat from […]

I remember my teachers always telling me there are no stupid questions. When it comes to identity theft, this is especially true. The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft. What is identity theft? […]

Many people will be familiar with renowned psychologist Robert Cialdini’s “Six Principles of Influence”. In its most basic form Cialdini offers a step-by-step psychological guide to getting people to say yes. Very effective in the workplace or that crucial sales meeting, but these principles aren’t necessarily confined to the noble quest of ‘better business.” In […]