Rocky the Raptor here, your friendly neighborhood cybersecurity evangelist from RPost. Let’s be honest, most cybersecurity events are a blur of buzzwords. And true to form, this was in line.
Rocky the Raptor here, your friendly neighborhood cybersecurity evangelist from RPost. At the recent Gartner IT Security Conference I attended, a hot topic sparked discussion:
“Are Humans Trainable to Spot AI-Powered Impersonation Lures?”
Rocky the Raptor here, your friendly neighborhood cybersecurity evangelist from RPost. I just swooped back from the Gartner European (in London) IT Security Conference — my talons still tingling from all the hot takes and sharp debates.
Hey there, Rocky the Raptor here, RPost's cybersecurity product evangelist. I’m here to speak about a BLUF (hint, not a cliff).
Rocky the Raptor here, your sharp-clawed cybersecurity evangelist, here to rip apart some old myths about Man-in-the-Middle (MITM) attacks - those sneaky tactics most people think they understand, but few realize just how far they’ve evolved.
Hey there, Rocky the Raptor here, swooping in to chat about a big shift in the world of cyber threats. Back in the day, companies (especially law firms) worried a lot about what we used to call a “Man-in-the-Middle” attack.
Rocky the raptor here, RPost’s cybersecurity product evangelist. I’m feeling somewhat famous, having been profiled in the news yesterday and having my kind (Raptor) plastered as the brand of the newest and coolest Cyber Command Center.
Rocky the raptor here, RPost’s cybersecurity product evangelist. I was thinking about Shakespeare’s famous line in relation to the job of an IT security professional: “To be or not to be, that is the question.”
Rocky the raptor here, RPost’s cybersecurity product evangelist. I thought we’d have some cybersecurity fun today and play a little game of “This or That”. Meaning, I will present two options, and you pick which you prefer, this one or that one.
Rocky the raptor here, RPost’s cybersecurity product evangelist. I’ve seen a lot from my perch high above the cyber battlefield. Here’s a fact: once a cybercriminal makes their move, they’re not lumbering around looking for an open door; they’re sprinting through it, dumping your data into the dark web before you’ve even had your first coffee.
April 22, 2026
April 17, 2026
April 03, 2026
March 27, 2026
March 20, 2026