By Mark Webb-Johnson, Chief Technology Officer, Network Box An application or operating system crash seems to be the norm with modern computers. We have all become used to frequently saving our work, hitting that ‘Relaunch’ button, and carrying on from where we were interrupted. But have you ever wondered about […]

Bugs, Crashes, and Vulnerabilities


By Rita Jiselle Earlier this year, the FBI flagged warnings about chronic Kwampirs malware attacks, although news surrounding this first came to light in April 2018. This was based on reports by US cybersecurity firm Symantec, who suspected that a certain ‘Orangeworm’ utilized Kwampirs malware on companies in the supply […]

Kwampirs Malware: How Can We Protect Ourselves From It?


With a recent announcement, Senserva launched a new product, dubbed SenservaPro. This patent-pending solution is a serverless cloud platform that keeps a company’s data, user accounts, and cloud environment secure through interactive user review and risk assessment of a client’s accounts and configurations.  Founded by Internet security pioneer Mark Shavlik, […]

New Security Platform for Managing Microsoft 365 and Azure Active ...



By Devin Partida, Editor-in-Chief, ReHack.com In the middle of the coronavirus pandemic, small businesses have to tackle a lot of obstacles. With health hazards and economic droughts threatening companies, preventing cybercrime may not seem like a priority right now. Despite the way it may seem, companies would benefit from learning some […]

Why Small Businesses Need to Prioritize Cybersecurity During COVID-19


It’s not exactly an age-old question, but one that gets a lot of attention these days. To be generous, let’s assume that everyone is interested in adhering to behavior that is suggested by public health officials as a way to protect themselves and others from the coronavirus. But, sometimes we […]

To Mask or Not to Mask?


By Megan Nichols, Technical Writer and Editor at Schooled By Science. Today’s landscape is one where enterprises cannot afford to ignore risks and losses stemming from failures to stop a cyber threat. However, some leaders need encouragement with getting on board with cybersecurity best practices. Here are some crucial things […]

How to Help Businesses Detect Cyber Threats



Ransomware attacks have nearly tripled as businesses have pivoted to remote workforces the last few months, which has put further strain on organizations already struggling to cope with the economic downturn. 60% of all ransomware attacks targeted SMBs more than any other industry Over $11.5 billion in damages for businesses hit by ransomware attacks […]

Infographic: Ransomware Is Something We Should Be Worried About


By Jack Warner Bug bounty is the term used to describe the reward paid out to developers who find critical flaws in a piece of software or website. Simply put, bug bounty programs offer prizes to white-hat hackers who can find vulnerabilities in an application. Prizes can be in the […]

Bug Bounty Programs and Why They Are Important


By Peter Kelley Google and AppViewX have announced Google’s new Certificate Authority Service (CAS) to secure applications, and the CAS integration with AppViewX to deliver seamless deployment and management of cloud public key infrastructure (PKI). The move is geared to meet the growing demand for containerized certificate management across DevOps […]

Google Certificate Authority Service, AppViewX Team for Seamless Deployment ...



While the coronavirus pandemic upends the economies of countries around the world, there are welcome indications that some major cybersecurity firms still see a bright future on the horizon.  A specific example of one company whose vision extends beyond the current economic strife is found in Silverfort. Silverfort, the provider […]

Financial Indication That Agentless Authentication Provider Eyes a Bright Future


In response to news that a 17-year-old was one of three people arrested in connection with the largest privacy and security breach in Twitter’s history and the bitcoin scam that saw the accounts of public figures such as Barack Obama, Bill Gates and Joe Biden hijacked for fraud, an expert […]

Arrests in Twitter’s Largest Security Breach – Expert Comment


LogRhythm’s Global Study Reveals Security Teams’ Stress Levels Surge Due to Lack of Proper Tools and Executive Support, Impeding Ability to Tackle Threats Much can be learned from the many industry reports produced each year. They illuminate the various aspects of security including the challenges we face and the tools […]

93% of Security Professionals Lack the Necessary Tools to Detect ...