STEALTHbits Technologies, a leading cybersecurity software company, has appointed several new executives to support strong demand for its award-winning data access governance, active directory security and privilege access management solutions. Gerrit Lansing joins as Field CTO, Ralph Martino joins as Vice President of Product Strategy for Data Access Governance, and […]

STEALTHbits Executives Added to Support Growth


TrackTik’s new, first-of-its-kind Advanced Break Management solution gives security organizations peace of mind by making it easier to comply with changing break rules and legislation – and reduce legal and financial risk – while simultaneously increasing workforce flexibility and guard productivity. Powered by TrackTik’s Back Office Suite, this breakthrough solution […]

First-of-its-Kind Break Management Software by TrackTik


By Jascha Bryce Almost everyone puts a premium on cybersecurity these days. From average Joes to small and medium enterprises, to multinational companies, people have made a concerted effort to protect their online identity. In essence, Generation X paved the way for the evolutionary process of Internet security. This demographic […]

The Next Generation of Cyber Security Pros: Is Gen Z ...


As everybody becomes more dependent on internet connectivity for work, recreation and socialization, we inevitably increase our risk of digital foul play. Below is a look at five industries that are especially susceptible to cybersecurity threats. Thankfully, they’re also well-positioned to make “cybersecurity 2020” a top priority through cultural and […]

5 Industries Doubling Down on Cybersecurity in 2020



Let’s face it, it is rare to find exciting innovation from the security industry’s big-dog conglomerates.  We usually expect change to be incremental and without surprise from these industry behemoths while the startups more commonly provide noteworthy new ideas, technologies, and solutions.  This is why we walked away from a […]

Innovative Ways of Harnessing Data to Manage Security Threats


While we are all aware that businesses and individuals are subject to identity theft in increasing numbers, did you know that child identity theft is also on the rise? Why is this happening? Children’s credit histories are often blank slates, and fraudsters may be able to get away with stealing […]

Preventing Identify Theft Is Not Child’s Play


Cities, factories and consumers are coming to rely on IoT technology. While it allows for the collection and use of huge amounts of data, it also creates new massive security risks. These devices aren’t always properly shielded against electromagnetic interference (EMI) and radiofrequency interference (RF interference or RFI) — whether […]

RF Interference and Security: 4 Things to Know


In August of this year, BSM posted an article outlining a conversation we had with Saumitra Das, CTO at Blue Hexagon. This piece, entitled When You Live and Die by the 1-Second Rule, examined an announcement from Blue Hexagon that introduced an industry-first ability to detect and stop, in real-time, […]

Deep Learning Solution Earns Perfect Score in Threat Protection Test



By Greg Young, Vice President of Cybersecurity at Trend Micro DevOps is the new engine for global business growth. All over the planet, organizations are becoming more responsive to changing market demands thanks to the roll-out of agile, automated development processes. Yet there are challenges. Cybersecurity remains the number one […]

Securing DevOps: Why Culture is Key to Driving Company-Wide Success


Each year, cybersecurity companies publish a number of research reports focusing on different aspects of cybersecurity and breach trends. A big shout-out to Brittney Regalado of 10Fold Communications for sending over the below list of some of the most alarming statistics from 2019 reports, just in time for Halloween. Arkose […]

Scary Security Stats


In cybersecurity breach de jour news it seems that a popular mobile social game company, Zynga Inc., was recently breached and gave up information on more than 218 million users.  While the breach itself was quietly announced by Zynga on September 12, 2019, they offered precious few details.  The story […]

Popular Game Company Zynga Breached


For most users – business or personal – price should not be the sole determining factor when it comes to choosing a backup storage provider.  You are backing up your data for a reason. Your data is important to you. That being said, there are few things as satisfying as […]

Backing up Your Data Is Critical for Security but How ...