Cybersecurity


By Corey Nachreiner, CSO at WatchGuard Technologies Do you remember Coinbase’s mysterious Super Bowl ad? The moving QR code on a plain black background with no other information was intended to make viewers curious and lure them into scanning the QR code.  While this might have been a clever marketing idea, […]

Cybersecurity Ramifications of Mainstream QR/AR Codes





By Devin Partida, Editor-in-Chief, ReHack.com Cybersecurity is a growing concern with new technology. We can streamline processes using technology, but sometimes personal information can be leaked. Online safety is more important than ever as transportation becomes more connected. Here are a few reasons why cybersecurity is essential and how to implement […]

Do We Need to Increase Cybersecurity in Transportation?





By Pratik Kirve, Team Lead – Content Writing at Allied Market Research The cybersecurity scenario is changing year after year. Every year presents new challenges and opportunities. This year is no exception and a few trends are taking place to ensure the security of devices, systems, and networks. With cyber-criminals […]

Five Key Cybersecurity Trends Taking Place in 2022


By Theo Zafirakos, CISO Terranova Security Three billion phishing emails are sent globally every day.  That’s right. Billion. These emails are a serious threat. Organizations must be constantly vigilant because if employees don’t know how to spot phishing emails, your organization’s information is at risk. Knowing how to build a […]

How to Build a Successful Phishing Simulation Campaign


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Hackers are employing new techniques to compromise data centers, including power attacks. These hacks target a server’s power consumption and center power infrastructure. This attack method could significantly damage data center equipment, lead to lengthy outages or make valuable information easier to acquire. The […]

How to Protect Data Centers From a Power Attack



By Devin Partida, Editor-in-Chief, ReHack.com Accepting mobile payments can be highly beneficial for businesses. The transaction time is much faster than traditional payment methods, cutting out the need to count exact change or wait for cards to process, which takes around 12 seconds compared to one second for mobile pay. Also, […]

Is It Safe for Businesses to Use Mobile Pay?


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Logistics organizations must address critical cybersecurity gaps to defend themselves from increasing threats. This can be challenging since there are so many variables and moving parts to keep track of. Frequently, employees themselves pose a security weakness. However, organizations must understand and respond to […]

Addressing Cybersecurity Gaps in Logistics


William Shakespeare eloquently asked in Romeo and Juliet: “What’s in a name? that which we call a rose By any other name would smell as sweet.” In today’s industry news post, we ask and answer this question relating to a well-known and highly respected cybersecurity risk management provider that has […]

What’s in a Name? MRK Technologies Rebrands to Become Inversion6