• Lunarline

    Lunarline

    Keyboard cowboys? Actual for real Jedis? Are the tales true? Find out.

  • Feeling lost?

    Feeling lost?

    Get in touch with us without ever leaving Earth orbit.

  • Incident Response

    Incident Response

    Our forensics guys are on the scene fast. Like, rocket fast.

  • OMG H4x0rz!!1!

    OMG H4x0rz!!1!

    Cyber security isn't rocket surgery. But it's best to leave it to the pros.

  • Get Certified!

    Get Certified!

    Can't come to us? Our instructors will go to whatever galaxy you call home.

  • Join Us

    Join Us

    Looking for a new gig? Suit up and blast off.

Is Your Office Hackable?

Office workers at night

For many companies, cyber crime has taken a prime spot on their list of concerns. According to ESG research published in June 2014, 62 percent of organizations surveyed have plans to increase their funding for cyber security initiatives in the near future, and 32 percent said that cyber security is one of their top budgeting priorities. Yet with so much ...

Read More »

Cyber Criminals Uncharitable to Non-Profits

Icon of Money in the Hand on Digital Background.

As despicable and unsettling as it may be, there are a lot of people who steal from charities. Sometimes the perpetrator is closely involved with the organization and misappropriates funds. Other times it’s an unsavory characters who takes cash straight out of a donation box. But most often, the thief is someone much more cunning. Someone who never sets foot ...

Read More »

Increase Your Cyber Security Savvy & Outpace Hackers

cyber savvy

Without a thorough understanding of their cyber security posture, organizations put themselves at risk for preventable, potentially catastrophic data breaches. Even some of the largest companies have had to learn this lesson the hard way, and the news headlines about their plight should serve as a warning. The recent theft of payment card information for approximately 350,000 Neiman Marcus customers ...

Read More »

The Third-Party Challenge: Keeping Hackers Out of Remote Access Systems

iStock_000016892513Small

Giving third-party vendors remote network access opens up new possibilities for organizations. It can streamline operations, enhance service and support functions, and ultimately help a business become more competitive. Unfortunately, for all the benefits it offers, third-party remote access also raises critical cyber security concerns. Many recent network breach incidents involve third-party remote access tools as an entry point. For ...

Read More »