The PLEX Sabbatical Program

Posted in:

At PLEX, we believe that you are the best investment we could ever make. The entire PLEX model is based on a simple premise:  Maximize our PLEX Family Members to the greatest extent possible.  Part of getting you where you…

HackASat2

Posted in:  

PLEX partnered with CrypticVector during the HackASat2 Qualifiers in June 2021, a 30-hour event involving complex space physics, satellite communications challenges, reverse engineering, and hacking.  The team, SingleEventUpset, secured 6th place out of over 1,000 teams worldwide, which now qualifies them…

Cybersecurity and Storytelling

Posted in:  

I’ve been working in cybersecurity for over 20 years and have been working as a “virtual CISO” since about 2015. In the early days, I was drawn into the cybersecurity field by a fascination with the technical aspects of hacking…

Plex Competes in the Finals of Hack-A-Sat

Posted in:  

It started with 2,213 teams across the world, competing in a satellite hacking competition sponsored by the Air Force Research Laboratory.  The world’s best and brightest hacking teams competed in a weekend-long qualifying competition in May.  The Top 8 qualifiers…

Password Audit

Posted in:

Why Password Audits need to be on your priority list ASAP.  While many authentication mechanisms are adapting current technology trends such as Multi-Factor Authentication, Biometric sensors, and cryptographic tokens, there is one component that will remain prevalent for the foreseeable future – passwords.  Passwords control the access to…

Nessus versus Penetration Test

Posted in:

Why Nessus Scans cannot replace Penetration Testing.  Many organizations utilize security products to support their IT and Cybersecurity personnel.  These applications can assist with Vulnerability Management, Asset Management, and Network Management, often incorporating features that give visibility and statistics on their findings within…

Active Directory Audit

Posted in:

Why Active Directory Audits should be an important component of your information security program  Security appliances such as Tenable’s Nessus and Qualys assist with scanning an organization’s assets for misconfigurations, security vulnerabilities, and missing patches – however, they ignore a very big culprit for risks…

2020 Space Security Challenge – Hack-A-Sat

Posted in:  

Over 1,200 teams from across the world competed in last weekend’s 2020 Space Security Challenge, Hack-A-Sat, qualifier event sponsored by the US Air Force. The top 8 teams advance to the final stages of Hack-A-Sat where teams receive a flat-sat and solve challenges…