Cybersecurity



By Devin Partida, Editor-in-Chief, ReHack.com Throughout the pandemic, airports have been one of the hardest-hit sectors. Traveling by plane is far from where it used to be in terms of physical and digital security. In fact, according to the Transportation Security Administration (TSA), 324 million passengers traveled by plane in 2020, […]

2021 Airport Security Predictions: Physical and Cybersecurity Trends


DoD Supply Chain Can Now Benefit From Steel Root’s Unique CMMC Compliance Services in Combination With Zscaler’s FedRAMP-Authorized Zero Trust Secure Access Technology SALEM, MA (March 2021) – Steel Root, a leading cybersecurity services firm that specializes in compliance for the U.S. Defense Industrial Base, announces that they have partnered with Zscaler, Inc. to […]

Steel Root Partners with Zscaler to Support CMMC Requirements for ...




Is your ETRM system leaving you exposed to hackers? By Kent Landrum Energy or commodity trading and risk management (ETRM or CTRM) systems have been gaining momentum since the 1990s and continue to be at the heart of many energy companies’ information technology landscapes. In many cases, these applications have […]

The Cybersecurity Risk Posed By Your Outdated ETRM System


Industry online event features insightful sessions from Gartner, other industry experts and pioneers in the CCoE movement on next-gen certificate and key lifecycle automation and machine identity management Given today’s escalating threat environment, it is crucial that enterprises adopt current cybersecurity tools and processes. Machine identity and PKI management require […]

AppViewX Hosts “Simplify PKI 2021” Virtual Cybersecurity Summit



February 2021 – Under UK law, the police are not permitted to use evidence obtained through the interception of communications but a recent Appeals Court ruling allows them to use evidence obtained by systematically hacking the supply chain of secure communications software and hardware vendors. Julian Dean, founder of the […]

Court decision legitimizes cyber attacks by the police and security ...


By Emily Newton Cybersecurity practitioners are continually concerned with staying ahead of online criminals. However, as such attacks become more prevalent, it’s getting harder for them to succeed in that already-daunting task. Deep learning may help. This is a subset of artificial intelligence that uses algorithms inspired by the human […]

How Can We Apply Deep Learning Algorithms for Cybersecurity?