Guest Contributor


By Marc Wilczek, Managing Director at Link11 The financial industry as a whole, and crypto exchanges in particular, are increasingly falling victim to hacker attacks, mostly through so-called distributed denial-of-service (DDoS) attacks. What can corporate IT managers do to successfully fend off such hacks?  Two-fold task between investigating authorities and […]

Boom in Cyberattacks: Why the Threat Level Remains Stronger Than ...


By Devin Partida, Editor-in-Chief, ReHack.com It’s becoming increasingly common for departing employees to take data when they leave a company. Often, such instances are not malicious, and they occur by accident. For example, someone might use a personal USB drive to store some workplace files and realize that they still possess […]

Preventing Internal Theft With Cybersecurity Measures


By Apu Pavithran, Chief Executive Officer and Founder of Hexnode Every year, we witness enterprise tech advance forward in leaps and bounds. The dawn of IoT-enabled devices, the mass exodus to the cloud, and the onset of super-fast networks like 5G have revolutionized the modern-day workspace and have enticed the […]

Three Reasons for the Enterprises to Deploy Endpoint Management Solutions ...



By Samuel Jones, VP of Product Management at Stellar Cyber A few years ago, a shift occurred in security where it became less about assessing and protecting locality and more about seeing the big picture. Like science, journalism, judicial consideration, and even witness credibility, effective security depends on your point […]

Effective Security Depends on Your Point of View – Why ...


By Sal Petriello, Director of Integrated Risk Management Strategy at NAVEX Recent coverage of cybersecurity incidents stemming from compromises of organizations’ third-party vendors highlights an important, yet often overlooked, aspect of risk management. While the specifics of execution can be complex, it is imperative for risk managers to grasp and […]

The Pillars of Third-Party Risk Management


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Vehicle fleets are becoming increasingly interconnected. Fleet tracking technologies, predictive maintenance sensors and more have seen surging adoption in the past few years, but they bring new risks with their benefits. Telematics security should be at the top of every fleet manager’s mind. Telematics […]

You Need to Protect Vehicle Data with Better Telematics Security



By David Vincent As a Certified Data Privacy Solution Engineer, I have led hundreds of data privacy risk assessment and remediation services across many industries. Maintaining effective data privacy can be challenging for organizations. According to the 2021 Thomson Reuters Regulatory Intelligence Cost of Compliance annual report, two of the […]

Eight Key Investments for An Effective Data Privacy Risk Program



By Alan Cunningham Viewing Critical Infrastructure and Key Resources (CIKR) as systems as a network is quite beneficial to the study of national and human security initiatives, especially when viewing complex CIKR systems, as the entire chapter of our text details.  Ted Lewis’ book Critical Infrastructure Protection in Homeland Security: Defending […]

Complex Systems and Natural Disasters: Critical Infrastructure and Key Resources ...



By Lisa Pellegrene National Red Alert, Inc. based in Titusville, Florida, provides a rapid response notification system, utilizing patented EDIS (Event-Driven Information System)based technology.  The company is seeking up to $5,000,000 from accredited investors under its Security and Exchange Commission (SEC) Reg D 506c offering. The technology provides a transparent […]

National Red Alert, Inc. Provides Unique Patented EDIS Personal Security ...