Guest Contributor


By Ezra Vazquez-D’Amico, Manager of GiveSafely.io The last four years have seen a growing awareness about the value of personal data and how exposed individuals are to nefarious forces, abuse, and hacks. With tech giants reaching multi-billion dollar valuations based on their monetization of personal data, coupled with high profile hacks and […]

How Data Decentralization, Encryption, and Security Can Enhance Trust in ...





By Devin Partida, Editor-in-Chief, ReHack.com In the middle of the coronavirus pandemic, small businesses have to tackle a lot of obstacles. With health hazards and economic droughts threatening companies, preventing cybercrime may not seem like a priority right now. Despite the way it may seem, companies would benefit from learning some […]

Why Small Businesses Need to Prioritize Cybersecurity During COVID-19





By Saloni Walimbe, Content Writer at Global Market Insights, Inc. These days, organizations, regardless of their size or magnitude, are susceptible to a host of critical cyberattacks from various sources. Hacktivists, accidental or malicious insider threats, organized crime, nation-states, and many other such sources pose a significant risk to organizations […]

Endpoint Security Solutions and Their Contribution Towards Cybersecurity Amid an ...


By Kirsty Fisher, Chief Financial Officer at Titania In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group which was using common Internet of Things (IoT) devices to carry out widespread corporate attacks. The way in? Internet connected devices including […]

Compliance in a Connected World


By Reggie Best, President & Chief Product Officer, FireMon Lumeta We have seen significant growth in IoT infrastructure in the past decade, especially this past year. By 2025, International Data Corporation predicts there will be 41.6 billion connected IoT devices, or “things,” generating 79.4 zettabytes of data. While the advancement […]

Reduce Your IoT Attack Surface and Protect Your Infrastructure from ...