By Joe Caradonna, owner of PROSHRED Arizona Securely destroying important documents and electronics is an important security step for any company. Businesses need secure document shredding services on a regular basis and security companies that are experts at their work will dispose of your information in a secure and environmentally […]

Do Secure Hard Drive Destruction and Recycling the Right Way


By Devin Partida, Editor-in-Chief, ReHack.com Accepting mobile payments can be highly beneficial for businesses. The transaction time is much faster than traditional payment methods, cutting out the need to count exact change or wait for cards to process, which takes around 12 seconds compared to one second for mobile pay. Also, […]

Is It Safe for Businesses to Use Mobile Pay?


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Logistics organizations must address critical cybersecurity gaps to defend themselves from increasing threats. This can be challenging since there are so many variables and moving parts to keep track of. Frequently, employees themselves pose a security weakness. However, organizations must understand and respond to […]

Addressing Cybersecurity Gaps in Logistics



William Shakespeare eloquently asked in Romeo and Juliet: “What’s in a name? that which we call a rose By any other name would smell as sweet.” In today’s industry news post, we ask and answer this question relating to a well-known and highly respected cybersecurity risk management provider that has […]

What’s in a Name? MRK Technologies Rebrands to Become Inversion6


In Episode S4E12, our guest is Jim Nitterauer, Director of Information Security at Graylog. In a fun and informative conversation, BSM’s Steve Bowcut and Jim discuss how organizations can move cybersecurity from a cost center to a revenue enabler.  Steve asks Jim to: Discuss some of the costs organizations face […]

How to Move Cybersecurity From a Cost Center to a ...


By Jessica Amado, Head of Cyber Research at Sepio The Internet of Things (IoT) is becoming widely adopted across all industries, including critical infrastructure sectors, such as healthcare, energy, telecommunications, and more. IoTs are valuable tools, boosting efficiency and productivity through big data and connectivity. Contrarily, however, the characteristics of […]

IoTs Know a Lot About Us, But What Do We ...



By Zachary Amos, Features Editor at ReHack Managing passwords online can be a task. To deter cyber-attackers, users have to create long, complex passwords for each account. However, it is necessary — especially since high rates of data breaches occur every year. In 2021, there were a total of 1,291 breaches […]

Is It More Secure to Stop Using Passwords?


Independent research uncovers gap between CISOs and the board when it comes to cyber investment, with 60% of CISOs feeling unsupported in mitigating against cyber-attacks. Maidenhead, UK. 13 June 2022: Over half (54%) of Chief Information Security Officers (CISOs) say the board fails to provide them with ample investment for cyber […]

54% Of CISOs Are ‘Fighting an Uphill Battle’ for Board-Level ...


In back-to-back industry announcements this week, SIRP—a leading provider of a No-Code Risk-based Security Orchestration, Automation and Response (SOAR) platform—wins a prestigious award and gains a new board member.  On June 6, 2022, SIRP announced the appointment of Damian Miller to its board of directors. The company said that Mr. […]

SIRP Wins 2022 Fortress Cyber Security Award and Adds New ...



RSAC is a great place to gain insight into what’s new and who’s new in the security industry, and this year is no exception. One announcement that caught our attention is from the cybersecurity software company that uses behavioral science and data science to transform security awareness and human cyber […]

CybSafe Raises $28M Series B funding Round as it Bolsters ...


Recent breaches have highlighted the risk of threat actors exploiting stolen API keys and secrets. Too often, developers store API keys in their code, increasing the potential for threat actors acquire them and exploit them to access APIs and applications. Developers have frequently been urged not to store hardcoded keys […]

Runtime Secrets Protection


In Episode S4E11, our guest is Ray Steen, Chief Strategy Officer of the IT managed services firm, MainSpring. In a fascinating and informative discussion, BSM’s Steve Bowcut and Ray talk about: The common vulnerabilities threat actors exploit to launch a ransomware attack. The relationship between the size of a business and […]

How Managed Security Service Providers Can Help Protect Against Ransomware