In Episode S3E9 we depart from our normal format and interview four guests at once. The panel for this episode is made up of Karen Quatromoni, the Director of PR at Object Management Group, and three co-chairs of the Trustworthiness Task Group for the Industry IoT Consortium, they are: Marcellus […]

Industry IoT Consortium’s Trustworthiness framework foundations


By Devin Partida, Editor-in-Chief, ReHack.com Physical security and cybersecurity used to be separate fields, and most businesses still treat them as such. However, as the internet of things (IoT) has brought the digital and physical worlds together, that’s no longer the case. Reliable security today must combine these two once distinct […]

How to Incorporate Cybersecurity Into Physical Security Strategies


By Emily Newton People within and outside of the health care sector are excited about the potential of precision medicine. They believe that thanks to resources like a patient’s DNA data, it’ll eventually be possible to engineer treatments specifically for them. Additionally, genomic information could help pharmaceutical companies create drugs […]

How Can We Use the Blockchain to Secure Precision Medicine?



In Episode S3E8, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. […]

10 Keys to Preventing Ransomware


A headline out of CyberSN today caught our attention, so we decided to dig a little deeper. Not all press releases warrant an article devoted to their content, but this one does. A new dedicated cybersecurity career marketplace from CyberSN fits nicely to fill a void we have noted and […]

New Dedicated Cybersecurity Career Marketplace


By Emily Newton Cyberattacks are on the minds of every leader, supervisor, and business owner as their prevalence grows. Each year, more and more high-profile attacks sweep across markets, with no industry an exception, including logistics. Cyber pirates have turned their focus to shipping cyber attacks, alongside other mission-critical sectors. […]

5 Ways Shippers Can Prevent Cyber Attacks



By JG Heithcock, GM, Retrospect, a StorCentric company Over the past year, COVID-19 quarantines, lockdowns, and self-imposed isolations sent tens of millions of people around the globe to work, learn and shop from home. A paradigm that is predicted to last in full or hybrid fashion perhaps indefinitely. While many […]

The KISS Principle Still Holds True When It Comes to ...


By Devin Partida, Editor-in-Chief, ReHack.com Cleaning up after a break-in is never easy. In addition to physical damage, the business owner must file reports, close the business temporarily, and investigate replacing stolen goods. It’s possible for any business to deter these break-ins with the right process changes or store upgrades. These […]

6 Ways Businesses Can Deter Break-Ins


In Episode S3E7 our guest is Zack Schuler. Zack is the founder and CEO of NINJIO – a global cybersecurity awareness company that teaches employees and their families how not to get hacked. Zack is an authority on cybersecurity, employee engagement, and related tech issues. He has written for Forbes, […]

Cybersecurity Awareness Training – Why It Works



By Jeff Broth Security testing is crucial, especially as cyber threats continuously evolve with no signs of stopping or slowing down.  To achieve the best outcomes from the security solutions employed in an organization, it is not enough to have the best tools and keep them up to date. There […]

How to Continually Test Security Controls and Boost Security Posture


Data Lab is the first in a series of tools to help security companies make better-informed business decisions through easy access to customizable dashboards monitoring key performance indicators. Montreal, Canada — TrackTik, an innovative and growing security workforce management software provider that helps the physical security industry deliver security services, […]

TrackTik Launches Data Lab to Transform Data into Key Business ...


By Pankaj Singh The global cybersecurity market has established itself as a tremendously lucrative investment avenue in recent years due to the increasing demand for security solutions across several enterprises throughout the world. Several industries and firms spread across the globe are adopting cybersecurity solutions to safeguard their online financial […]

3 Major Trends Influencing the Global Cybersecurity Market Outlook Over ...