Cybersecurity


By Theo Zafirakos, CISO Terranova Security Three billion phishing emails are sent globally every day.  That’s right. Billion. These emails are a serious threat. Organizations must be constantly vigilant because if employees don’t know how to spot phishing emails, your organization’s information is at risk. Knowing how to build a […]

How to Build a Successful Phishing Simulation Campaign


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Hackers are employing new techniques to compromise data centers, including power attacks. These hacks target a server’s power consumption and center power infrastructure. This attack method could significantly damage data center equipment, lead to lengthy outages or make valuable information easier to acquire. The […]

How to Protect Data Centers From a Power Attack


By Devin Partida, Editor-in-Chief, ReHack.com Accepting mobile payments can be highly beneficial for businesses. The transaction time is much faster than traditional payment methods, cutting out the need to count exact change or wait for cards to process, which takes around 12 seconds compared to one second for mobile pay. Also, […]

Is It Safe for Businesses to Use Mobile Pay?



By Emily Newton, Editor-in-Chief at Revolutionized Magazine Logistics organizations must address critical cybersecurity gaps to defend themselves from increasing threats. This can be challenging since there are so many variables and moving parts to keep track of. Frequently, employees themselves pose a security weakness. However, organizations must understand and respond to […]

Addressing Cybersecurity Gaps in Logistics


William Shakespeare eloquently asked in Romeo and Juliet: “What’s in a name? that which we call a rose By any other name would smell as sweet.” In today’s industry news post, we ask and answer this question relating to a well-known and highly respected cybersecurity risk management provider that has […]

What’s in a Name? MRK Technologies Rebrands to Become Inversion6




By Jessica Amado, Head of Cyber Research at Sepio The Internet of Things (IoT) is becoming widely adopted across all industries, including critical infrastructure sectors, such as healthcare, energy, telecommunications, and more. IoTs are valuable tools, boosting efficiency and productivity through big data and connectivity. Contrarily, however, the characteristics of […]

IoTs Know a Lot About Us, But What Do We ...



Independent research uncovers gap between CISOs and the board when it comes to cyber investment, with 60% of CISOs feeling unsupported in mitigating against cyber-attacks. Maidenhead, UK. 13 June 2022: Over half (54%) of Chief Information Security Officers (CISOs) say the board fails to provide them with ample investment for cyber […]

54% Of CISOs Are ‘Fighting an Uphill Battle’ for Board-Level ...



In back-to-back industry announcements this week, SIRP—a leading provider of a No-Code Risk-based Security Orchestration, Automation and Response (SOAR) platform—wins a prestigious award and gains a new board member.  On June 6, 2022, SIRP announced the appointment of Damian Miller to its board of directors. The company said that Mr. […]

SIRP Wins 2022 Fortress Cyber Security Award and Adds New ...