By Sahil Sharma An organization’s website is its biggest digital asset and should be treated as such. As your website grows and delivers more complex functionalities, the security risk grows with it. According to a recent study, over 30,000 websites are hacked every day, with 20 million breaches in a […]

Are Your Current Security Measures Strong Enough to Protect Your ...


By Devin Partida, Editor-in-Chief, ReHack.com Nonprofits are an essential part of today’s economy and create plenty of jobs throughout the country. There are many types of nonprofit organizations, but they all have one thing in common — the need for comprehensive cybersecurity. However, unlike for-profit organizations, nonprofits must find innovative ways […]

How Nonprofits Can Get Better Access to Cyber Defense Measures


By Karen Bolton, CEO, Nettitude Commonly recognized as one of the biggest risks to any organization, cybersecurity is at the top of boardroom agendas. With digital transformation accelerating across the globe, effective assurance is crucial for entire digital ecosystems. Organizations must protect vital assets from attack and damaging compromise while […]

Cybersecurity and the Future of Assurance in an Ever-Changing Risk ...



By Mike Ahmad, ACHE, VP of Business Growth & Imaging Technology at ABM Healthcare As increased reliance on Operational Technology (OT) and Internet of Things (IoT) solutions provides welcome ease of use and added connectivity in the healthcare space, it also introduces potential cybersecurity threats that put hospital and patient […]

Healthcare: Enhancing the Patient Experience with Cybersecurity


In Episode S3E14 our guest is Jeff Macre – a Cybersecurity Project Manager at 1898 & Co. and we discuss the critical labor shortage, or skills gap, current in the areas of IT and OT cybersecurity. 1898 & Co. is part of Kansas City, Missouri-based engineering firm Burns & McDonnell […]

Labor Shortage for IT and OT Cybersecurity




By Apu Pavithran, Chief Executive Officer and Founder of Hexnode It has been more than two decades since the term Internet of Things was first coined in 1999. Today, IoT is a paradigm that is converging into every aspect of our lives. Currently, there are more than 13 billion active […]

Securing IoT Devices in a Business Network


By: Zack Schuler, founder and CEO of NINJIO What would you do if your organization was hit by a cyberattack? At a time when reports of major data breaches and other attacks have become constant, this is a question CEOs, CISOs, and employees are increasingly asking themselves. Considering the stratospheric […]

Why a Well-Trained Workforce Is the Best Form of Cyber ...


By Danielle Whittaker, Marketing Executive at Kingdom Services Group When the COVID-19 pandemic hit, no one could predict how things would change. Closures of stores, work-from-home mandates, and limited outside activity meant the world changed nearly overnight. This left some security professionals scrambling. It didn’t come as a surprise when […]

7 Ways Physical Security Has Changed as a Result of ...



By Alan Cunningham The United States’ communications sector faces a variety of threats from multiple different actors, including foreign intelligence entities, organized criminal groups, and terrorist organizations, and methods, such as physical infiltration and the gaining of sensitive data and the electronic hacking into databases to access information or shut […]

The Power to Manipulate and Deceive: Social Media as the ...


The survey, commissioned by Evolv Technology, quantifies the mental toll gun violence takes on Americans. More than half of Americans are willing to go through weapons detection screening at everyday locations, such as the grocery store, workplace, or movie theater. One-third (31%) report increased anxiety when going into a large […]

New Research: 1 out of 5 Americans Believe Their Chances ...


By Rick Bentley, CEO, Cloudastructure Want to see an industry that is a good example of where video surveillance security is headed? Look no further than the cannabis industry. Most states require cannabis businesses to record activity in every area of their enterprise with clear images showing customer and employee activity, plus cash […]

Post-Pandemic Intelligence: Why More Enterprises Are Embracing Cloud-Based Security