As Head of Threat Resistance at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer, support manager and lead ethical hacker. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).
This blog will discuss how ransomware is impacting healthcare systems—both from a business and patient safety perspective—and how these companies can mitigate such attacks as much as possible.
More and more people are working from home more frequently. While this is great for work-life balance and productivity, it does pose a cybersecurity risk for your company’s network. This blog will look at how home network security can impact the cybersecurity of your business.
This blog will take a look how the cybersecurity industry has fared so far in 2019, including updates from major headlines, new trends industry events, product launches, etc. It will also dive into what Armor predicts will take place over the next few months in terms of industry trends and insights.
In 2017, members of Congress originally introduced the “Active Cyber Defense Certainty Act,” more commonly known as, the “Hack Back Bill.” This blog will give a comprehensive overview of the Hack Back bill, from a technical and legal perspective, and provide insight on proactive measures to mitigate recovery efforts.
On May 7, news broke that the City of Baltimore joined the ranks of at least 22 other U.S. government organizations compromised by a ransomware attack in 2019. Since then, the threat actor holding the city’s data for ransom has publicly taunted Mayor Bernard C. “Jack” Young on Twitter in hopes of collecting payment. Our team has closely followed this incident, tracking the Twitter profile of the hacker, and analyzing the ransomware used in the attack. This event reminds us how prolific ransomware has become over the past several years.
We’re collecting the stories of Armor’s top-preforming security professionals to show you the human element of cybersecurity. In this interview, we talk to Christopher Hinkley, our lead ethical hacker.
What is the appropriate schooling, training, and certifications required to proceed along the path to becoming a cyberwarrior? Are there skills from other professional backgrounds that lend themselves well to a career fighting cybercrime? Read our cyberwarrior blog to find the answers.
A look at what a day-in-the-life of white hat v. black hat cybersecurity hackers look like. We dive into their differences, real-world groups and more in this blog.