PLEX Welcomes Tony Liberto to the team
Posted in: News Solutions Uncategorized
Tony Liberto is the Vice President of the DCS (Digital Cyber Solutions) division. He has over 25 years of experience in SIGINT, Network Engineering, Systems Engineering, Software Engineering and Program Management supporting various agencies across the Intelligence Community. Tony is…
Cybersecurity Association of Maryland (CAMI)
Posted in: Cyber News Solutions Uncategorized
A big PLEX thank you to Cybersecurity Association of Maryland, Inc. (CAMI) for hosting an incredible night of cocktails, laughs, and team building at their Chopped Mixology Event! The Ladies of PLEX showed up and represented! It was great to be able…
The PLEX Ownership Program (The POP)
Posted in: News Uncategorized
And now, the moment you’ve all been waiting for…PLEX’s BIG News!
The PLEX Sabbatical Program
Posted in: Uncategorized
At PLEX, we believe that you are the best investment we could ever make. The entire PLEX model is based on a simple premise: Maximize our PLEX Family Members to the greatest extent possible. Part of getting you where you…
HackASat2
PLEX partnered with CrypticVector during the HackASat2 Qualifiers in June 2021, a 30-hour event involving complex space physics, satellite communications challenges, reverse engineering, and hacking. The team, SingleEventUpset, secured 6th place out of over 1,000 teams worldwide, which now qualifies them…
Plex Competes in the Finals of Hack-A-Sat
It started with 2,213 teams across the world, competing in a satellite hacking competition sponsored by the Air Force Research Laboratory. The world’s best and brightest hacking teams competed in a weekend-long qualifying competition in May. The Top 8 qualifiers…
Password Audit
Posted in: Cyber
Why Password Audits need to be on your priority list ASAP. While many authentication mechanisms are adapting current technology trends such as Multi-Factor Authentication, Biometric sensors, and cryptographic tokens, there is one component that will remain prevalent for the foreseeable future – passwords. Passwords control the access to…
Nessus versus Penetration Test
Posted in: Cyber
Why Nessus Scans cannot replace Penetration Testing. Many organizations utilize security products to support their IT and Cybersecurity personnel. These applications can assist with Vulnerability Management, Asset Management, and Network Management, often incorporating features that give visibility and statistics on their findings within…
Active Directory Audit
Posted in: Cyber
Why Active Directory Audits should be an important component of your information security program Security appliances such as Tenable’s Nessus and Qualys assist with scanning an organization’s assets for misconfigurations, security vulnerabilities, and missing patches – however, they ignore a very big culprit for risks…