Monthly Archives: February 2023


By Emily Newton, Editor-in-Chief at Revolutionized Magazine IoT cybersecurity is critical for safety and success in five key industries today. Manufacturing, supply chain, healthcare, energy and transportation businesses face higher than average risk of IoT-related security vulnerabilities. It is crucial for businesses in these industries to be aware of the risks […]

The Top 5 Industries that Need IoT Cybersecurity


By Dimitri Nemirovsky, Atakama Co-founder, and COO Data breach headlines arrive fast and furious, with examples aplenty. The constant assault on companies is well known – the attack surface continues to expand, and sophisticated attacks are becoming more common. So, when state and independent actors continuously change and increase their attack capabilities, […]

From Checkbox to Checkmate: Protecting Critical Data With Multifactor Encryption


As cybersecurity threats become more sophisticated, organizations must employ new measures to protect their networks, digital assets, and data. By understanding and implementing these concepts, you can help reduce your organization’s risk of a cyberattack. In Episode S5E4, cybersecurity expert Bikash Barai, Co-founder of FireCompass, explains how to manage your […]

External Attack Surface Management and Continuous Automated Red Teaming



By Gary Phipps, GRCP, CTPRP, VP Strategy & Business Transformation at CyberGRX There’s no question that we are marching steadily into an increasingly digital future. Nor should it surprise anyone that the vast majority of businesses are prioritizing digital transformation initiatives. Modernization efforts vary based on each company’s goals. However, […]

The Most Common Third-Party Security Gaps Businesses Should Focus On ...


By Idan Wiener, Co-founder and CEO of illustria The world of cybersecurity was rocked by The SolarWinds hack was a significant event as it demonstrated the potential for supply chain attacks to be used to gain access to a wide range of organizations. With these kinds of attacks, hackers target […]

The Next Software Supply Chain Attack Is Imminent, So How ...




IT and security teams can now quickly evaluate endpoint compliance against more than 300 CIS Level 1 Benchmarks, accelerating vulnerability assessment and remediation NEWPORT BEACH, Calif. – February 22, 2023 – Syxsense, a global leader in Unified Security and Endpoint Management (USEM) solutions, today announced Center for Internet Security (CIS) […]

Syxsense First to Combine Endpoint Security Scanning and Remediation for ...


By Zachary Amos, Features Editor at ReHack Nearly every industry in the global economy is becoming increasingly concerned about cybersecurity threats. Hackers are using various methods to access companies’ networks and systems to launch attacks, making it challenging for businesses to continue operating as usual. The construction industry is becoming more […]

Cybersecurity Risks in the Construction Industry




By Ralph Rodriguez, President and Chief Product Officer at Daon Cyber risks become more prevalent and sophisticated every day. As consumers look to increase their security online, passkeys may be the emerging solution they’re looking for. Passkeys, also referred to as multi-device credentials, provide a more secure alternative to passwords. […]

Five Things to Know about Passkeys for the Enterprise


Medical devices are becoming increasingly interconnected and vulnerable to cyber-attacks. As a security professional, it’s crucial that you understand the risks and how to safeguard these devices. Episode S5E3 will provide an overview of the medical IoT landscape and critical considerations for protecting these devices. Listen in as Richard Staynings, […]

What Security Professionals Need to Know About Safeguarding Medical Devices ...


By Scott Perry, Principal, Crypto and Digital Trust, Schellman For the past several months, crypto companies have been given the lion’s share of attention from boards, businesses and leadership for their failures when audited or assessed. While the consequences are warranted, unfortunately, it seems that the story of cryptography is […]

Beyond the Crypto Noise, Working Towards a Harmonic Digital Economy