Information Security

Information Security

Rebyc Security at the Jack Henry & Associates JAC 2017

  REBYC SECURITY EXHIBITS AT THE JACK HENRY AND ASSOCIATES CUSTOMER CONFERENCE!! Did you make it out to the JAC 2017?  If not, you missed a great event put on by the team JHA.  This was our first time attending and ...

Information Security Malware Penetration Testing Phishing Ransomware

Rebyc Security’s Patrick Barry at North Carolina Technology Association (@NCTA) Tech Talk Live

In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC.  The panel broke down some of the key differences between...

Information Security Vulnerability Assessments

6 Ways to Help Guard Against DDoS Attacks

Newly released news stories and YouTube videos have surfaced the past couple of weeks that have outlined new attack plans from the collective hacker group known as Anonymous.  The #OpIcarus campaign is calling for all An...

Breach Information Security Password Cracking Penetration Testing

Staying Safe After a Breach

In what’s becoming almost a daily occurrence, another breach has left usernames and hashed passwords exposed on the Internet.  Time Warner Business Class was recently breached by TeaMp0isoN, which dumped almost 4200 cred...

Chief Information Security Officer CISO Information Security

The Changing Dynamics of the CISO Role

The research team at Korn Ferry recently put out an excellent read on the “The Rise of the Chief Information Security Officer.”  It can be found here: The Rise of the Chief Information Security Officer Their ...