Editorial Staff



Erica Smith garners industry-wide recognition for exceptionalism in cybersecurity awareness and compliance training field COLUMBIA, Md., (May 11, 2021) – Global Learning Systems’ Erica Smith was recently distinguished as one of the Top 25 Women Leaders in Cybersecurity of 2021 by The Software Report, an industry source for tech-sector market […]

GLS Head of Operations Named Among Top 25 Women ...


By Peter Kelley OneTrust, a fast-growing data privacy, compliance and governance enterprise platform backed by leading VCs, has acquired Shared Assessments, the global membership organization dedicated to developing the best practices, education, and tools to drive third-party risk assurance.  Recent global events such as the COVID-19 pandemic and Solar Winds […]

OneTrust Acquires Shared Assessments, Third-Party Risk Management Leaders



By Dan Baker, SecureTeam Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused as the same service, which leads to business owners purchasing one service when they are really in need of the other.  In an […]

Which Is More Important: Vulnerability Scans Or Penetration Tests?


By Devin Partida, Editor-in-Chief, ReHack.com Communication is an incomparable business tool. It brings customers and employees together to facilitate sales and solve inquiries, whether in person or over the internet. With the rise of virtual communication products like apps and chatbots, businesses are shifting the way they interact with consumers. […]

6 Cybersecurity Best Practices for Customer Communication Tools




By Devin Partida, Editor-in-Chief, ReHack.com Throughout the pandemic, airports have been one of the hardest-hit sectors. Traveling by plane is far from where it used to be in terms of physical and digital security. In fact, according to the Transportation Security Administration (TSA), 324 million passengers traveled by plane in 2020, […]

2021 Airport Security Predictions: Physical and Cybersecurity Trends


DoD Supply Chain Can Now Benefit From Steel Root’s Unique CMMC Compliance Services in Combination With Zscaler’s FedRAMP-Authorized Zero Trust Secure Access Technology SALEM, MA (March 2021) – Steel Root, a leading cybersecurity services firm that specializes in compliance for the U.S. Defense Industrial Base, announces that they have partnered with Zscaler, Inc. to […]

Steel Root Partners with Zscaler to Support CMMC Requirements for ...




Is your ETRM system leaving you exposed to hackers? By Kent Landrum Energy or commodity trading and risk management (ETRM or CTRM) systems have been gaining momentum since the 1990s and continue to be at the heart of many energy companies’ information technology landscapes. In many cases, these applications have […]

The Cybersecurity Risk Posed By Your Outdated ETRM System


By Tim Sadler, CEO of Tessian Throughout the Covid-19 pandemic, cybercriminals have capitalized on key moments and the latest updates. We’ve seen hackers impersonate governmental departments, healthcare organizations, and charities, often in phishing attacks designed to lure unsuspecting victims into wiring money or sharing account details and confidential data. One […]

How to Not Fall Victim to COVID-19 Vaccine Phishing Attacks


February 2021 – Under UK law, the police are not permitted to use evidence obtained through the interception of communications but a recent Appeals Court ruling allows them to use evidence obtained by systematically hacking the supply chain of secure communications software and hardware vendors. Julian Dean, founder of the […]

Court decision legitimizes cyber attacks by the police and security ...