By Emily Newton Internet of Things (IoT) devices are a consistent but manageable threat facing today’s enterprises. For example, many companies have IoT device policies and tightly controlled environments that help keep IT risks at bay. Things drastically changed with more employees working remotely during the COVID-19 pandemic. Many company […]

4 Ways Remote Work Is Increasing IoT Cybersecurity Threats


In Episode S3E5, we talk with Purandar Das, CEO and Co-Founder at Sotero – Sotero offers the first field-level, universal data protection platform. We talk about the importance of data, the data lifecycle, and why it is essential to encrypt data at each stage of the lifecycle. We discuss the […]

The Importance of Encryption in Today’s Data-dependent World


The notion that strong encryption, combined with better tools, is the only real way to ensure the protection of data and systems from external threats—no matter how sophisticated—has given rise to new technologies that address gaps in traditional cybersecurity systems. Enhanced cryptographic capabilities enable the creation of advanced encryption products, […]

Strong Encryption and Better Tools are the Way to Ensure ...



By Matt Lindley, COO and CISO at NINJIO Think about the last time you heard a joke that didn’t land – it’s difficult to imagine anything more awkward for the person who told it and the audience alike. In professional settings, however, awkwardness alone can be a trivial concern when humor […]

Why Cybersecurity Training Is No Laughing Matter


Erica Smith garners industry-wide recognition for exceptionalism in cybersecurity awareness and compliance training field COLUMBIA, Md., (May 11, 2021) – Global Learning Systems’ Erica Smith was recently distinguished as one of the Top 25 Women Leaders in Cybersecurity of 2021 by The Software Report, an industry source for tech-sector market […]

GLS Head of Operations Named Among Top 25 Women ...


By Peter Kelley OneTrust, a fast-growing data privacy, compliance and governance enterprise platform backed by leading VCs, has acquired Shared Assessments, the global membership organization dedicated to developing the best practices, education, and tools to drive third-party risk assurance.  Recent global events such as the COVID-19 pandemic and Solar Winds […]

OneTrust Acquires Shared Assessments, Third-Party Risk Management Leaders



AppViewXpert™ program helps drive new opportunities and maximize profitability for partners as demand for Machine Identity Management and Application Delivery Automation grows. Gartner has named Machine Identity Management one of the top security and risk management trends for 2021, reinforcing the absolute need for a robust, end-to-end solution that can […]

New AppViewX Channel Program to Drive New Opportunities


By Dan Baker, SecureTeam Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused as the same service, which leads to business owners purchasing one service when they are really in need of the other.  In an […]

Which Is More Important: Vulnerability Scans Or Penetration Tests?


By Devin Partida, Editor-in-Chief, ReHack.com Communication is an incomparable business tool. It brings customers and employees together to facilitate sales and solve inquiries, whether in person or over the internet. With the rise of virtual communication products like apps and chatbots, businesses are shifting the way they interact with consumers. […]

6 Cybersecurity Best Practices for Customer Communication Tools



Blue Hexagon racks up another honor among AI cybersecurity firms. The number of applications for artificial intelligence in cybersecurity is growing rapidly. From what was theoretical only a few years ago to solutions that bring substantial benefits to cyber defense operations today, AI now can stop cyber adversaries and malware […]

Innovative Artificial Intelligence Startup Making Its Mark



By Mike Khorev Currently, the Internet has become an essential component of our daily routine. Many services accessible online lead more people to patronize Internet usage. The demand increases drastically as the COVID-19 pandemic spreads worldwide.   With limited physical interactions, various fields of our society have been stagnant for a […]

An Introduction to the Analysis of Privacy on the Internet