PLEX Welcomes Tony Liberto to the team

Posted in:    

Tony Liberto is the Vice President of the DCS (Digital Cyber Solutions) division.  He has over 25 years of experience in SIGINT, Network Engineering, Systems Engineering, Software Engineering and Program Management supporting various agencies across the Intelligence Community. Tony is…

Cybersecurity Association of Maryland (CAMI)

Posted in:      

A big PLEX thank you to Cybersecurity Association of Maryland, Inc. (CAMI) for hosting an incredible night of cocktails, laughs, and team building at their Chopped Mixology Event! The Ladies of PLEX showed up and represented! It was great to be able…

The PLEX Ownership Program (The POP)

Posted in:  

And now, the moment you’ve all been waiting for…PLEX’s BIG News!

The PLEX Sabbatical Program

Posted in:

At PLEX, we believe that you are the best investment we could ever make. The entire PLEX model is based on a simple premise:  Maximize our PLEX Family Members to the greatest extent possible.  Part of getting you where you…

HackASat2

Posted in:  

PLEX partnered with CrypticVector during the HackASat2 Qualifiers in June 2021, a 30-hour event involving complex space physics, satellite communications challenges, reverse engineering, and hacking.  The team, SingleEventUpset, secured 6th place out of over 1,000 teams worldwide, which now qualifies them…

Cybersecurity and Storytelling

Posted in:  

I’ve been working in cybersecurity for over 20 years and have been working as a “virtual CISO” since about 2015. In the early days, I was drawn into the cybersecurity field by a fascination with the technical aspects of hacking…

Plex Competes in the Finals of Hack-A-Sat

Posted in:  

It started with 2,213 teams across the world, competing in a satellite hacking competition sponsored by the Air Force Research Laboratory.  The world’s best and brightest hacking teams competed in a weekend-long qualifying competition in May.  The Top 8 qualifiers…

Password Audit

Posted in:

Why Password Audits need to be on your priority list ASAP.  While many authentication mechanisms are adapting current technology trends such as Multi-Factor Authentication, Biometric sensors, and cryptographic tokens, there is one component that will remain prevalent for the foreseeable future – passwords.  Passwords control the access to…

Nessus versus Penetration Test

Posted in:

Why Nessus Scans cannot replace Penetration Testing.  Many organizations utilize security products to support their IT and Cybersecurity personnel.  These applications can assist with Vulnerability Management, Asset Management, and Network Management, often incorporating features that give visibility and statistics on their findings within…

Active Directory Audit

Posted in:

Why Active Directory Audits should be an important component of your information security program  Security appliances such as Tenable’s Nessus and Qualys assist with scanning an organization’s assets for misconfigurations, security vulnerabilities, and missing patches – however, they ignore a very big culprit for risks…