Editorial Staff


Kindervag will bring his unique expertise in zero trust framework to Traceable AI in their mission to revolutionize API security SAN FRANCISCO, March 14, 2023 — Traceable AI, the industry’s leading API security company, today announced that John Kindervag, known for creating the Zero Trust Model for cybersecurity, will be joining Traceable as an […]

Zero Trust Pioneer John Kindervag Joins Traceable AI as an ...


By Tal Zamir, CTO, Perception Point Enterprise phishing attacks generally start with run-of-the-mill emails believed to come from a trusted source. An employee clicks on an outwardly innocuous link and unwittingly shares sensitive data or responds to seemingly unremarkable requests from someone posing as a company executive – and the […]

Watch Your Head: The Growing Risk of Top-Down Cyber Attacks




By Emily Newton, Editor-in-Chief at Revolutionized Magazine IoT cybersecurity is critical for safety and success in five key industries today. Manufacturing, supply chain, healthcare, energy and transportation businesses face higher than average risk of IoT-related security vulnerabilities. It is crucial for businesses in these industries to be aware of the risks […]

The Top 5 Industries that Need IoT Cybersecurity


By Dimitri Nemirovsky, Atakama Co-founder, and COO Data breach headlines arrive fast and furious, with examples aplenty. The constant assault on companies is well known – the attack surface continues to expand, and sophisticated attacks are becoming more common. So, when state and independent actors continuously change and increase their attack capabilities, […]

From Checkbox to Checkmate: Protecting Critical Data With Multifactor Encryption


By Gary Phipps, GRCP, CTPRP, VP Strategy & Business Transformation at CyberGRX There’s no question that we are marching steadily into an increasingly digital future. Nor should it surprise anyone that the vast majority of businesses are prioritizing digital transformation initiatives. Modernization efforts vary based on each company’s goals. However, […]

The Most Common Third-Party Security Gaps Businesses Should Focus On ...



By Idan Wiener, Co-founder and CEO of illustria The world of cybersecurity was rocked by The SolarWinds hack was a significant event as it demonstrated the potential for supply chain attacks to be used to gain access to a wide range of organizations. With these kinds of attacks, hackers target […]

The Next Software Supply Chain Attack Is Imminent, So How ...



IT and security teams can now quickly evaluate endpoint compliance against more than 300 CIS Level 1 Benchmarks, accelerating vulnerability assessment and remediation NEWPORT BEACH, Calif. – February 22, 2023 – Syxsense, a global leader in Unified Security and Endpoint Management (USEM) solutions, today announced Center for Internet Security (CIS) […]

Syxsense First to Combine Endpoint Security Scanning and Remediation for ...



By Zachary Amos, Features Editor at ReHack Nearly every industry in the global economy is becoming increasingly concerned about cybersecurity threats. Hackers are using various methods to access companies’ networks and systems to launch attacks, making it challenging for businesses to continue operating as usual. The construction industry is becoming more […]

Cybersecurity Risks in the Construction Industry


By Ralph Rodriguez, President and Chief Product Officer at Daon Cyber risks become more prevalent and sophisticated every day. As consumers look to increase their security online, passkeys may be the emerging solution they’re looking for. Passkeys, also referred to as multi-device credentials, provide a more secure alternative to passwords. […]

Five Things to Know about Passkeys for the Enterprise


By Scott Perry, Principal, Crypto and Digital Trust, Schellman For the past several months, crypto companies have been given the lion’s share of attention from boards, businesses and leadership for their failures when audited or assessed. While the consequences are warranted, unfortunately, it seems that the story of cryptography is […]

Beyond the Crypto Noise, Working Towards a Harmonic Digital Economy