By Emily Newton, Editor-in-Chief at Revolutionized Magazine Digital solutions are expanding into nearly every industry on the planet, and for good reason. The benefits it offers productivity, efficiency, and automation mean businesses have a lot to gain from its use. Manufacturing is no stranger to modern tech and connected or smart […]

Is the Manufacturing Industry Prepared to Defend Against Cyber Threats?


In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you’ll learn how LiveAction’s AI-driven anomaly detection and predictive threat intelligence can […]

AI-driven Anomaly Detection and Predictive Threat Intelligence


By Sal Petriello, Director of Integrated Risk Management Strategy at NAVEX It’s no longer enough to only manage and mitigate the “human risk” of internal employee behavior as organizations increasingly share sensitive data with third-party partners that are critical to their operations and supply chains. Even with limited resources, risk […]

Properly Managing the Human Side of Information Security



By Dr. Darren Williams, CEO and Founder of BlackFog The average cost of ransomware attacks increased by 71% this year, reaching an all-time high of nearly $1 million per attack. To make matters worse, tactics like double extortion have also increased exponentially, with 80% of ransomware attacks last year involving […]

Why We Need a New Approach to Manage the Golden ...


By: Peter R. Kelley New research from Omdia and Cybrary drives home the need for organizations to invest in sustained and ongoing professional development and upskilling for their cybersecurity teams, particularly during periods of economic uncertainty such as we currently find ourselves in. Cybrary experts note the potential reputational and […]

Upskill Cybersecurity Pros in Uncertain Economy, Experts Warn


In Episode S4E17, Frederick Hirsch, an independent consultant and a co-author of the IoT Security Maturity Model (SMM) Practitioner’s Guide, speaks with the host, Steve Bowcut, about the SMM profile for Digital Twins.  Frederick explains digital twins and gives some practical examples of how they are used. Steve and Frederick […]

The Security Maturity Model profile for Digital Twins



In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. The topic Steve Bowcut and Abhay discuss is The Application […]

The Application Security Skills Gap


By Apu Pavithran, Founder and CEO of Hexnode Every story has a villain and a hero. On 3rd October 2022, when the world was celebrating National Techies Day, the ransomware attack on CommonSpirit Health, a Chicago-based system that operates 142 hospitals, stole the day’s show. Putting lives at stake, ransomware […]

How Digitally Malnourished Are Your Healthcare Kiosks?


By Sharmistha Bose Technological advancements have indeed transformed our lives for the better. One technology that has evolved magnificently over the years is the video camera. Earlier, video cameras only found applications in shooting videos. However, in today’s age, they do much more than that. With advanced built-in systems and […]

The Video Analytics Market Flourishes Owing to the Enormous Scope ...



By Paul Caron, Head of Cybersecurity, Americas at the intelligence and cyber consultancy S-RM Russia has long been home to some of the most skilled hackers in the world. According to research conducted by Chainalysis, 74% of all money made through ransomware attacks in 2021 went to Russia-linked hackers. Their researchers revealed […]

Defying expectations: Why did ransomware attacks dip in July-August 2022, ...


Passwords are a pain. We all know we should use different passwords for every account, but remembering them is nearly impossible. Like most people, you probably have a few favorite passwords you repeatedly use to access dozens or even hundreds of online accounts because you can’t remember more than that. […]

Password Manager and Privileged Access Management in a Single Platform


By Renata Budko, Head of Product at Traceable AI With today’s enterprises, the importance of API security is growing daily due to the extreme pace of API adoption. APIs are fundamentally altering how companies operate both internally and externally. Because more devices and other systems need API-driven solutions, the number […]

Understanding Your API Vulnerabilities and How to Prevent Exploits