A Historical Journey of Cybercrimes

It’s 2022 and cybercrime occurs regularly. It affects our personal and professional lives, and we are constantly aware of its presence. While this category of crime mutates daily, society and the law struggle to keep up with its’ developments. But when did cybercrime begin? Did it begin with the creation of the computer? The internet? […]

The Critical Challenges of Physical Security Convergence

Technology convergence greatly expands the risk of physical security system design and deployment shortcomings. New thinking is required to get things right. AI and the Nonstop Evolution of Computing and Networking AI has pushed exponential technology advancement into hyperdrive, and AI-enabled physical security products are creating a fundamental break from the past 50 years of […]

Beyond Scanning: Advancements in Identifying the Global Threat Landscape

At the 2022 Converge Security Conference, we unveiled an internal initiative for the rapid identification and cataloging of internet-accessible services. Our objective was to deepen our understanding of the global threat landscape by conducting highly distributed port scans across the entire addressable IPv4 space. We explored the architecture, tooling, and methodology necessary to leverage thousands […]

AI Resilience: Prepare your workforce for modernized attacks

ChatGPT, Deep Fakes, and other AI-based technologies are increasing the speed of technological advances as we’ve never seen before. Cybercriminals are poised and ready to take advantage of the unsuspecting. We must enhance our approach to human risk to thwart the malicious use of these advancements. You’ll walk away from this session with a clear […]

Evel Kneivel Hacked your Organization: Leaping the Chasm between Physical and Cyber Security

Get ready for an electrifying presentation by Kevin Johnson, the mastermind behind Secure Ideas! Join him on an adrenaline-pumping rollercoaster ride as he unveils a real-world attack that’ll leave you on the edge of your seat. Brace yourself for the unexpected twists and turns as Kevin demonstrates how physical access can morph into mind-boggling cybersecurity […]