Thousands of virtual appliances are being distributed with known, exploitable, and fixable security flaws and often on outdated operating systems. Organizations depend on virtual appliances for securing cloud workloads, firewalls, secure gateways, and encryption. To help the cloud security industry keep pace with demand, Orca Security released the “2020 State […]

2020 State of Virtual Appliance Security Report


By Tamara Parker, Safetrust The implications of COVID-19 have been profound, and the road to business recovery is evolving and fluid. Facility leaders around the world are shifting their priorities. Their focus was once creating a workplace that promotes employee productivity and company values. Now, it’s ensuring that their workplace, […]

Four Ways to Increase Safety and Security at the Office ...


The young entrepreneurs hacking for Citedelo gain an investor despite the global pandemic Zug, Switzerland – November 16th, 2020: The Swiss-based cloud security company, Artmotion, announced today that it’s entering the ethical hacking space by acquiring 58% shares in Citadelo and becoming a board member. The European cybersecurity firm currently […]

Artmotion invests in the cybersecurity firm Citadelo and expands across ...



By Devin Partida, Editor-in-Chief, ReHack.com Physical security and safety have seen many changes in 2020. Due to the coronavirus pandemic, hospitals have had to adjust their protocols and practices, making sure they are secure places where the virus won’t spread. The following trends show how far health care workers can go […]

Physical Security in Hospitals: Trends of 2020


By Mark Webb-Johnson, Chief Technology Officer, Network Box From the time a vulnerability is announced, a race starts between developing, testing, releasing, and installing the patches to fix it; and the attackers developing their exploits to take advantage. Virtual Patching aims to deploy early patches ‘virtually.’ Sometimes on the affected […]

Virtual Patching


By: Jeffrey Ricker, co-founder and CEO of Hivecell Now more than ever, audio and visual security systems create massive amounts of raw data every second. As companies embrace technologies such as the Internet of Things (IoT) and machine learning, these systems are pushing hours upon hours’ worth of data―most of […]

The Cloud Is No Longer A Viable Option for Security ...



Gamified, Hands-on CTFs, Pentests, and Other Challenges Help Assess Candidates Under Real-World Conditions. By Peter Kelley Point3 Security has rolled out its Talent Screening service to help organizations identify the optimal talent for their needs with new efficiency, economy, and precision. “Point3 Security allowed us to not only pick someone […]

Point3 Security Talent Screening Service Identifies Cybersecurity Talent with The ...


I love the idea of being able to use flash drives safely. There are many applications where a flash drive provides the convenience and portability that organizations need. Flash drives lend themselves well to everyday tasks like sharing large files with colleagues or backing up an entire data collection.  Everyone […]

Finally, a Bluetooth Flash Drive That Meets My Needs


By Ron Stoner, Head of Security at Casa Digital security is premised on fear. And with good reason. The world is awash with cybercriminals who will exploit any vulnerability to steal your money, your passwords, and even your identity. And yes, often, the smartest thing to do is to entrust […]

Why Don’t People Trust Themselves to Hold Bitcoin?



Freedom is now available as a cost-effective, always-up-to-date Access Control as a Service (ACaaS) for subscription-based security management and video surveillance through the cloud  FREMONT, Calif., November 9, 2020 — Identiv, Inc. (NASDAQ: INVE), a global leader in digital identification and security, today announced the release of Freedom Cloud, the cloud-based Access Control […]

Freedom Cloud ACaaS Enables Pay-as-You-Go Remote Access Control


By Megan Nichols, Technical Writer and Editor at Schooled By Science High-quality parts play substantial roles in helping companies build solid reputations and earn the trust of customers. However, numerous sources and ongoing research show that counterfeit products represent a trillion-dollar global problem that could hurt companies’ bottom lines and endanger […]

How to Improve Supply Chain Security by Removing Counterfeit Parts


By Matt Lindley, COO and CISO at NINJIO Cybersecurity is an issue that many people ignore until a cyberattack suddenly upends their day-to-day digital routine. This is why cybersecurity has to be built into those routines – no matter what you’re doing online, cybercriminals are constantly on the lookout for […]

How to Defend Yourself From the ‘Man in the Middle’