By Mike Khorev Currently, the Internet has become an essential component of our daily routine. Many services accessible online lead more people to patronize Internet usage. The demand increases drastically as the COVID-19 pandemic spreads worldwide.   With limited physical interactions, various fields of our society have been stagnant for a […]

An Introduction to the Analysis of Privacy on the Internet


By Tamas Kadar, Co-Founder and CEO of SEON, the fraud fighters The costs of cybercrime exceeded $1 trillion in 2020, up 50% from 2018. Ordinary people around the world were moving more aspects of their life online, with a number of people using eCommerce for the first time and employees […]

From Account Farming to Wardrobing – A dictionary of cybersecurity ...


In Episode S3E3, we talk with Kim Loy, Chief Product Officer at ACRE, a global networking and security solution leader. We probe whether cloud-based physical access systems have lived up to their expected adoption by end-users. We look at some of the potential cybersecurity risks associated with exposing physical access […]

Cybersecurity for Physical Access Control in the Cloud



By Devin Partida, Editor-in-Chief, ReHack.com Throughout the pandemic, airports have been one of the hardest-hit sectors. Traveling by plane is far from where it used to be in terms of physical and digital security. In fact, according to the Transportation Security Administration (TSA), 324 million passengers traveled by plane in 2020, […]

2021 Airport Security Predictions: Physical and Cybersecurity Trends


DoD Supply Chain Can Now Benefit From Steel Root’s Unique CMMC Compliance Services in Combination With Zscaler’s FedRAMP-Authorized Zero Trust Secure Access Technology SALEM, MA (March 2021) – Steel Root, a leading cybersecurity services firm that specializes in compliance for the U.S. Defense Industrial Base, announces that they have partnered with Zscaler, Inc. to […]

Steel Root Partners with Zscaler to Support CMMC Requirements for ...


By Emily Newton People often discuss the blockchain in cryptocurrency conversations and, increasingly, when bringing up ways to secure the supply chain and achieve better transparency for all involved parties. However, it offers broader applications, too. Could the blockchain improve security in the online realm? Many people believe so. Here […]

How Is Blockchain Improving Cybersecurity?



Is your ETRM system leaving you exposed to hackers? By Kent Landrum Energy or commodity trading and risk management (ETRM or CTRM) systems have been gaining momentum since the 1990s and continue to be at the heart of many energy companies’ information technology landscapes. In many cases, these applications have […]

The Cybersecurity Risk Posed By Your Outdated ETRM System


In Episode S3E2 we talk with Jasen Meece, CEO at Cloudentity — a cloud-based provider of dynamic fine-grained authorization and governance solutions. We dive into zero trust for open banking APIs and uncover some of the threats associated with that market. We look at a new partnership just announced between Cloudentity and […]

Zero Trust for Open Banking


By Tim Sadler, CEO of Tessian Throughout the Covid-19 pandemic, cybercriminals have capitalized on key moments and the latest updates. We’ve seen hackers impersonate governmental departments, healthcare organizations, and charities, often in phishing attacks designed to lure unsuspecting victims into wiring money or sharing account details and confidential data. One […]

How to Not Fall Victim to COVID-19 Vaccine Phishing Attacks



By Devin Partida, Editor-in-Chief, ReHack.com Good security practices can help keep any business safe from threats like crime, extreme weather, and other emergencies. Many businesses, however, don’t have the best handle on their physical security. While they may have basic security protocols in place, they often overlook key areas of building […]

6 Physical Security Tips for Businesses in 2021


Industry online event features insightful sessions from Gartner, other industry experts and pioneers in the CCoE movement on next-gen certificate and key lifecycle automation and machine identity management Given today’s escalating threat environment, it is crucial that enterprises adopt current cybersecurity tools and processes. Machine identity and PKI management require […]

AppViewX Hosts “Simplify PKI 2021” Virtual Cybersecurity Summit


February 2021 – Under UK law, the police are not permitted to use evidence obtained through the interception of communications but a recent Appeals Court ruling allows them to use evidence obtained by systematically hacking the supply chain of secure communications software and hardware vendors. Julian Dean, founder of the […]

Court decision legitimizes cyber attacks by the police and security ...