Guest Contributor


By Denny LeCompte, CEO, Portnox In an era of relentless digital innovation and interconnectivity, safeguarding sensitive information has become an urgent necessity. As technology evolves at an unprecedented pace, so do the sophisticated techniques used by cybercriminals. Traditional security measures, once considered robust, are now proving to be inadequate in […]

Take Your ZTNA Blinders Off. True Zero Trust Requires More.





By Amod Gupta, Senior Director, Product Management, Traceable AI  ChatGPT, the generative artificial intelligence (AI) chatbot from OpenAI, is the fastest-growing consumer application in history with 100 million users just two months after launch. Consumers and enterprise teams alike are intrigued by this intelligent chatbot’s ability to streamline searches and […]

Shaping a Future Where Generative AI and Security Can Flourish


By William Powell Creating an online business promotes digitization, leading to cross-border brand awareness and limitless e-commerce opportunities. However, these benefits also come with potentially malicious activity. As the business owner, it becomes your responsibility to protect your online business from fraud and scams. Fortunately, there are steps you can […]

How to Protect Your Online Business from Fraud and Scams


By Ross Moore The Importance of APIs and Securing Them From the consumer side, there’s nothing easier than opening some apps and accessing tons of information from them. On the application side, it’s a completely different view. Microservices, network connections, legal agreements, and development resources – just to name a […]

APIs and Machine Learning- What You Need to Know



By Guy Eisdorfer, co-founder and CEO of Cognni Over the past few years, digitization has accelerated in almost every business sector. This movement was spurred in large part by the rise of work-from-home arrangements, increased cloud migration, and a greater reliance on the use of big data and AI-powered analytics. For many […]

Why Your Organization Needs a Zero Trust Cybersecurity Framework


Recruiting North American Channels Program Partners By: Peter R. Kelley BullWall, a global leader in ransomware containment, is bringing its patented ransomware “kill switch” Ransom Care into North America following strong success in Europe. Ransom Care is field proven to block ransomware from data sources in seconds and disable “patient […]

BullWall Brings Proven Ransomware “Kill Switch” to North American Market


By Niranjan Shankar, Software engineer at Microsoft Azure The widespread migration of on-premises workloads to the cloud, particularly in the aftermath of the Covid-19 pandemic, has made cloud security a growing concern for stakeholders across various industries. This uptick in cloud-based cyberattacks has compelled governments and enterprises to adopt “Zero-Trust” […]

Implementing Zero-Trust Security for Cloud-Native Applications with the Istio Service ...





By Zachary Amos, Features Editor at ReHack Data breaches and malware installations can be costly, but how do businesses correctly enforce cybersecurity guidelines? While no single answer ensures complete compliance, there are methods that can encourage employees to follow them.  Employee Preparation A business can enforce its security procedures by helping […]

How to Enforce Cybersecurity Guidelines in Business