World Hacker Games Feb-22-24 Now Live (sponsored by Plextrac)
Let the games begin.The inaugural World Hacker Games!
The first event was taped live on February 20th and lasted approximately 3 hours. Explore the highlights with the hosts' commentary. This initial event featured...
Avoiding QR Code and SMS Phishing
In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently, they released its latest security research findings...
Cybersecurity Defense Ecosystem Podcast Episode 10 – MRB PR: Planning the Right PR Strategy
Presenter: Michael Becce, CEO of MRB Public Relations
Julian Lee and Michael Becce talked about the significance of public relations (PR) in the technology industry, highlighting the need for strategic storytelling and...
Importance of DMARC in Email Authentication
Both Google and Yahoo will require bulk email senders to start using an authentication technology known as Domain-based Message Authentication Reporting and Conformance (DMARC). This latest requirement now sees all relevant companies needing to adopt three...
Cybersecurity Defense Ecosystem Podcast Episode 9 – ContentMX: Automating Marketing for Vendors
Presenter: Jeff Mesnik, President of ContentMX
Jeff Mesnik emphasized the importance of aligning vendor messaging for MSPs, with a focus on the need for a unified message to reach the audience effectively....
World Hacker Games Coming February 22nd
Let the hacker battles begin!Â
Hackers battle to find vital flaws in the infrastructure and cybersecurity defense systems, and PlexTrac will be there to defend and report.
On February 22, when the fight...
Cybersecurity Defense Ecosystem Podcast Episode 8 – ContentMX: Automating Marketing for MSPs
Presenter: Jeff Mesnik, President of ContentMX
Jeff Mesnik and Julian Lee explored the changing landscape of B2B buyer behavior and the success of MSPs using the Content MX platform, which offers a...
Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and underscored the significance of protecting mobile devices...
Cybersecurity Defense Ecosystem Podcast Episode 7 – Crosshair Cyber: What is the Right Incident...
Presenter: Adam Bennett, CEO at Crosshair Cyber
Julian Lee and Adam Bennett highlighted the significance of practicing and testing the incident response plan through realistic scenarios to identify and address any gaps....
Defining Supply Chain Defense in Cybersecurity
Julian Lee and BlueVoyant's COO of Supply Chain Defense, Brendan Conlon, discussed a survey conducted by BlueVoyant on supply chain defense, which focuses on cybersecurity and supply chain risk management. They...