Author Archives: Stan

The Ease of Checking for Compromised Credentials - image 20170121_vc_2017_security_e-570x342 on https://www.vericlouds.com

2017 Cyber Security Trends – 20 Professionals Speak Out

VeriClouds recently polled a field of Cyber Security professionals to get their opinions on the predominate threat trends in 2017. Our experts are CEO’s, CISOs, Engineers, Security Architects and Consultants working in universities, private consulting firms and corporations. Cyber Security 2017 Summary All responses, including those persons wishing to remain anonymous, were considered in writing […]

Read More

The Ease of Checking for Compromised Credentials - image FUD-Image-1-e1484100884339-512x342 on https://www.vericlouds.com

Fear, Uncertainty & Doubt

Fear, Uncertainty, and Doubt (FUD) are key Information Security (InfoSec) motivators and common sales techniques used today by many of the security solutions providers. The FUD Technique Using FUD as a technique to sell security services is simply diverting the customer’s attention away from the qualities and value of the service and focusing their attention […]

Read More

The Ease of Checking for Compromised Credentials - image Yahoo-Breach-Image-2-570x342 on https://www.vericlouds.com

DATA GOLD MINE – THE YAHOO BREACH (Again)

“The revelation of Yahoo’s latest hack underscores what many Americans have known for years: All those emails, photos and other personal files stored online can easily be stolen, and there’s little anyone can do about it.” The only saving grace is that the attackers apparently did not exploit the information for fraud. But their true […]

Read More

The Ease of Checking for Compromised Credentials - image Always-Verify-570x342 on https://www.vericlouds.com

Spear Phishing Harpoons 2FA

There are many types of attacks that could be used against your organization. Social Engineering is an attack vector that may include a variety of exploit strategies. In this post we will examine two common Social Engineering attacks that utilize a spear phishing strategy. Spear phishing against organizations is known to succeed against the most […]

Read More

We Accept Only Business Email Addresses – No Free or ISP Email Addresses

Please enter a business email address to obtain proper delivery of the product. If you do not have a business email address or experience any issues during the registration process, please send an email to support@vericlouds.com