top of page

Business of Security

ORNA
Jul 26, 20226 min read
How Fugitive Hacker Penetrated US Customs-Controlled Shipyard to Flee the Country
A lesson on the importance of maintaining a constant vigil against the possibility of insider threats.
168 views

ORNA
Jul 7, 20225 min read
Former Black Hat’s Perspective on Incident Response Planning for the Unexpected
We were at war, you and I - it wasn't personal. But for businesses and hackers worldwide, it isn't over either.
53 views

ORNA
Jul 7, 20226 min read
Hackers and the Cult of Personality
In the 90s, hackers kept a low profile, especially after 1986. But of course, we weren't all cut from the same cloth.
90 views
bottom of page