Guest Contributor


By Dan Baker, SecureTeam Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused as the same service, which leads to business owners purchasing one service when they are really in need of the other.  In an […]

Which Is More Important: Vulnerability Scans Or Penetration Tests?


By Devin Partida, Editor-in-Chief, ReHack.com Communication is an incomparable business tool. It brings customers and employees together to facilitate sales and solve inquiries, whether in person or over the internet. With the rise of virtual communication products like apps and chatbots, businesses are shifting the way they interact with consumers. […]

6 Cybersecurity Best Practices for Customer Communication Tools





By Devin Partida, Editor-in-Chief, ReHack.com Throughout the pandemic, airports have been one of the hardest-hit sectors. Traveling by plane is far from where it used to be in terms of physical and digital security. In fact, according to the Transportation Security Administration (TSA), 324 million passengers traveled by plane in 2020, […]

2021 Airport Security Predictions: Physical and Cybersecurity Trends




Is your ETRM system leaving you exposed to hackers? By Kent Landrum Energy or commodity trading and risk management (ETRM or CTRM) systems have been gaining momentum since the 1990s and continue to be at the heart of many energy companies’ information technology landscapes. In many cases, these applications have […]

The Cybersecurity Risk Posed By Your Outdated ETRM System


By Tim Sadler, CEO of Tessian Throughout the Covid-19 pandemic, cybercriminals have capitalized on key moments and the latest updates. We’ve seen hackers impersonate governmental departments, healthcare organizations, and charities, often in phishing attacks designed to lure unsuspecting victims into wiring money or sharing account details and confidential data. One […]

How to Not Fall Victim to COVID-19 Vaccine Phishing Attacks


By Devin Partida, Editor-in-Chief, ReHack.com Good security practices can help keep any business safe from threats like crime, extreme weather, and other emergencies. Many businesses, however, don’t have the best handle on their physical security. While they may have basic security protocols in place, they often overlook key areas of building […]

6 Physical Security Tips for Businesses in 2021



By Jean Michel, Chief Technology Officer, Total Processing  Stores closed and shoppers naturally moved online to purchase. The importance of safe online shopping became more significant than ever before. Many businesses just aren’t providing shoppers with the level of trust they expect. Where are businesses mainly going wrong when it […]

How to Build Customer Trust


By Emily Newton Cybersecurity practitioners are continually concerned with staying ahead of online criminals. However, as such attacks become more prevalent, it’s getting harder for them to succeed in that already-daunting task. Deep learning may help. This is a subset of artificial intelligence that uses algorithms inspired by the human […]

How Can We Apply Deep Learning Algorithms for Cybersecurity?


By Brian Stone, SVP Customer Success, FairWarning & Elizabeth Champion, VP and Chief Compliance Officer, FMOLHS From ensuring an organization meets regulatory requirements to preserving personal health information (PHI), healthcare compliance teams face a myriad of challenges to safeguard patient data. Oftentimes privacy, compliance, and security departments are siloed across […]

Working in Harmony to Create a Culture of Compliance