Blogs & Articles

Welcome To Our JAAG Inc. Blog & News Articles

Generated and curated by our staff

We wanted a place where we could showcase our staff’s thoughts on various aspects of Cybersecurity. These blogs represent their thoughts and ideas and are not specifically associated with our company’s ideas and position.
In addition, we also spent time curating articles that are currently on the Internet and wanted you to see them. So please enjoy and feel free to share.

Can we comment on your blogs?


The short answer is yes, and you can respond to other people’s comments also. Why not take it a step further and join our community! Reach out to the actual staff members who are posting blogs and even schedule an appointment with them if you like.

Can we share the News articles that are curated?


Absolutely, but this is just a taster. Please join our community (it’s free) to interact with the article itself and share, etc. Note, you can directly share our blogs from this website using your platform of choice.

Our Content

Latest Blogs

The following are the latest blog posts that our staff has published to our website:

  • Announcing  Technology & Cybersecurity For Seniors Collaboration

    Announcing Technology & Cybersecurity For Seniors Collaboration

    Announcing today, a collaboration between Calhoun Communication Network and JAAG Inc. on a unique program targeted at Senior Living Providers and the seniors they service to create security and self-confidence in the use of technology to better our seniors’ lives through communication. Dr. Denise Calhoun CEO of Calhoun Communications, a consulting firm that promotes effective…

    Read More

  • Phishing awareness training: Build the “Human Firewall”

    Phishing awareness training: Build the “Human Firewall”

    The following are some comments regarding this article: Source: Phishing awareness training: Help your employees avoid the hook Published:  21st June 2022, WeLiveSecurity by eset Author: Phil Muncaster This is an interesting article re-affirming the idea that the weakest Cybersecurity link in any organization is the human one. By far the main contributing factor in the vast majority…

    Read More

  • Pentesting & OSINT

    Pentesting & OSINT

    The following are some comments regarding this article:Source: Pentesting & OSINT tools (and tips for passing Pentest+)Published:  Day Month Year, PublisherAuthor: Maciej Makowski  This article is an excellent overview of some great Open Source Intelligence (OSINT) tools that are available and free. The author comments on Pentesting, what you need to be careful o,f and how you go…

    Read More

Cyber Community Articles

Latest Articles

The following are the latest Articles that are streaming to our JAAG Cybersecurity Community website click on image of Article to view or share.

Want to join our JAAG Cybersecurity community?

Its simple and easy to register an account and it is free!