Trends in Phishing Attacks: Safeguarding Your Organization’s Security
In today's world, phishing attacks pose a significant threat to organizations of all sizes. Cybercriminals are leveraging AI and other tools which help them increasingly sophisticated attacks crafted to deceive unsuspecting individuals. Below are some [...]
Effects of Cyberattacks on OT Environments
What is OT and IT? Operational Technology (OT) cyberattacks tend to have higher, more negative effects than those in Information Technology (IT) do, as they can have physical consequences (for example, shutdowns, outages, leakages, and [...]
Dark Rhino Security Announces Expansion to Mexico City
DUBLIN, Ohio, April 28th, 2023 - Dark Rhino Security, an innovative MSSP/MDR providing comprehensive “defense in depth” to small and medium businesses, announces its expansion into Mexico City. The announcement was made Monday, May 1st, Just [...]
Security Confidential S10 E9 Chris Cazel
Chris Cazel and Rory Meikle are BACK! This time with Tech news about War Thunder, Russias new bill, Apples Terms and Conditions, and more that you should know about https://youtu.be/co2CHGn1QGQ Chapter Titles: 00:00 Introduction [...]
Security Confidential S10 E8 Melissa Thornley
Melissa Thornley is a leadership consultant who focuses on using emotional intelligence to drive better results. She has years of experience as an advertising/film industry executive and has worked with McDonald’s, Walgreens, Anheuser Busch, Nike, [...]
Security Confidential S10 E7 Joel Beasley
Joel Beasley is a well-known figure in the tech industry. In 2017, he founded the Modern CTO Podcast while writing the Modern CTO book, with the goal of interviewing CTOs and sharing their experiences with [...]
Security Confidential S10 E6 Josh Mason
Josh Mason has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and [...]
Security Confidential S10 E5 Shea Nangle
Shea Nangle has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. https://youtu.be/4vt8ns6EX5Q Chapter Titles: 00:00 Introduction 01:07 Our Guest [...]
Security Confidential S10 E4 Mike Rice pt 2
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 2 of their conversation. https://youtu.be/Z0ZDCZVSYB8 [...]
Security Confidential S10 E3 Mike Rice pt 1
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation. https://youtu.be/mCMr-gI7aqY [...]
Security Confidential S10 E2 David Meece
David Meece is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from [...]
Security Confidential S10 E1 Jax Scott
Jax Scott is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant [...]
Increase Work Efficiency With A Remote Workforce
How To Keep Work Efficiency Up With A Remote Workforce In this time of social distancing, it is essential to have high efficiency with a remote workforce. Central to the success of a remote workforce [...]
Healthcare Companies & MSSPs
Healthcare Companies & MSSPs: Achieve Your Goals Healthcare organizations can utilize MSSPs like Dark Rhino Security to achieve business goals while also reducing legal, reputational, and financial risks. This can be done through the prevention [...]
Cyber Basics: Training the End-User
Training the End-User Imagine you invest millions in cybersecurity technology. Then, an untrained employee clicks on a link in an email. He just rained on your cyber parade and completely negated every measure you implemented. [...]
The Rundown on Ransomware
The Rundown on Ransomware Tyler Smith, a senior security engineer, was on his way to Kentucky when he received an urgent phone call – one of his clients suffered from a ransomware attack. The backup [...]
The Dangers Of Cybersecurity Burnouts
The Dangers Of Cybersecurity Burnouts Burnout from working too much is something every working person needs to worry about. But in some fields, the danger is magnified. Doctors, lawyers, and executives are common victims of [...]
Cyber Criminals Using ‘Linken Sphere’
'Linken Sphere' Every day, e-commerce and financial organizations around the world are targeted by cybercriminals. These criminals are often looking for customer information to use to steal the identities of customers or looking for information [...]
Are Video Games The New Golf?
Are Video Games The New Golf? Millennials grew up during the stock market crash of 2008. While we were young, our parents were focused on cutting costs and trying to scrape together money for retirement. [...]
Blue & Red Ocean Companies
What is the difference between Blue and Red Ocean Companies When it comes to competition, not every company has the same amount. Some companies compete in what is called red ocean spaces — so-called because [...]
How to keep your Data Secure
3 Ways To Keep Your Data Secure Here are 3 ways you can help keep your data secure and reduce your digital footprint. 1. Avoid using social media messaging services When you’re using a messaging [...]
Your Company Needs A Risk-Aware Culture
Your Company Needs A Risk-Aware Culture Cybersecurity can look dauntingly technical at first. You need a SIEM solution, an IAM solution, a DLP solution, and so forth — but the most important part of a [...]
The Two Key Benefits of Tying O365 To Okta
The Two Key Benefits of Tying O365 To Okta Most businesses that we work with utilize Office 365 to varying degrees. No matter which mix of the O365 services a business uses, you can pretty [...]
4 Misconceptions About CCPA Compliance
Correcting these misconceptions could save you thousands in fees What is CCPA? The California Consumer Privacy Act of 2018 (CCPA) gives consumers more control over the personal information that businesses collect about them and the CCPA regulations provide guidance [...]
Security Confidential S10 E7 Joel Beasley
Joel Beasley is a well-known figure in the tech industry. In 2017, he founded the Modern CTO Podcast while writing the Modern CTO book, with the goal of interviewing CTOs and sharing their experiences with [...]
Security Confidential S10 E6 Josh Mason
Josh Mason has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and [...]
Security Confidential S10 E5 Shea Nangle
Shea Nangle has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. https://youtu.be/4vt8ns6EX5Q Chapter Titles: 00:00 Introduction 01:07 Our Guest [...]
Security Confidential S10 E4 Mike Rice pt 2
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 2 of their conversation. https://youtu.be/Z0ZDCZVSYB8 [...]
Security Confidential S10 E3 Mike Rice pt 1
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation. https://youtu.be/mCMr-gI7aqY [...]
Security Confidential S10 E2 David Meece
David Meece is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from [...]
Security Confidential S10 E1 Jax Scott
Jax Scott is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant [...]
Security Confidential S9 E10 Dr. Wendy Ng
Wendy Ng is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. [...]
Security Confidential S9 E9 Bob Carver
Bob Carver CISM, CISSP, M.S. began his security career working in the financial industry. Later, Bob became the first full-time security employee hired to start the dedicated security monitoring and incident response team for Verizon [...]
Security Confidential S9 E8 Peter Warmka
Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) [...]
Security Confidential S9 E7 Eric Allard
Eric Allard is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On [...]
Security Confidential S9 E6 Dallas Baker
Dallas Baker is a US Army Veteran and Cyber Professional. He has worked for many companies including PerimeterX, Blue Shield, PayPal, and HUMAN where he is currently the Threat Intelligence Analyst. He is skilled in [...]