What's New

Here's what's happening at Rebyc

Breach Password Cracking Penetration Testing

Yahoo Breach(es) – Lessons Learned for your Company

Do you Yahoo? Remember that slogan back in the 90’s in the Yahoo commercials?  Well, you wouldn’t be alone if you do Yahoo, or did at least. Per SimilarWeb, Yahoo.com is still the most popular news and media website and ...

Phishing Social Engineering

MYTH: Phishing Tests Should Only Be Performed Annually

Here we go again – this is the third in our series of posts for National Cyber Security Awareness Month (NCSAM).  During the month, we are looking to dispel cyber security related myths that we hear all too frequen...

Patch Management Penetration Testing Vulnerability Assessments

MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test

This is our second National Cyber Security Awareness Month (NCSAM) post where we seek to dispel some myths about cyber security services. Throughout October, we’ll be posting some blogs breaking down some of the of the m...

Penetration Testing Vulnerability Assessments

MYTH: External Pen Test is the Same as an External Vulnerability Assessment

With National Cyber Security Awareness Month (NCSAM) now upon us, we thought it would be good to dispel some cyber security service related myths.  All too often, in conversations with our clients, we are finding they di...

Phishing Social Engineering

Phishing Attacks – Do’s and Don’ts to Protect Your Company

In Today’s world, a phishing attack is one of the most successful means a hacker uses to gain access to your data.  It’s not all that shocking given the improvements in technology, tools and education regardi...

Vulnerability Assessments

65% of Breaches Caused by a Third Party – How Well Do You Know Yours?

Hardly a day goes buy without a new headline about a high profile breach.  Pick up a local newspaper, or the NY Times or simply spend a few minutes on your LinkedIn thread and you’ll find news about Target, Home De...

Information Security Malware Penetration Testing Phishing Ransomware

Rebyc Security’s Patrick Barry at North Carolina Technology Association (@NCTA) Tech Talk Live

In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC.  The panel broke down some of the key differences between...

Information Security Vulnerability Assessments

6 Ways to Help Guard Against DDoS Attacks

Newly released news stories and YouTube videos have surfaced the past couple of weeks that have outlined new attack plans from the collective hacker group known as Anonymous.  The #OpIcarus campaign is calling for all An...

Breach Information Security Password Cracking Penetration Testing

Staying Safe After a Breach

In what’s becoming almost a daily occurrence, another breach has left usernames and hashed passwords exposed on the Internet.  Time Warner Business Class was recently breached by TeaMp0isoN, which dumped almost 4200 cred...

Chief Information Security Officer CISO Information Security

The Changing Dynamics of the CISO Role

The research team at Korn Ferry recently put out an excellent read on the “The Rise of the Chief Information Security Officer.”  It can be found here: The Rise of the Chief Information Security Officer Their ...