By Dannie Combs, Senior Vice President and Chief Information Security Officer at Donnelley Financial Solutions We’re all familiar with the dark web and its treasure trove of stolen data, illicit products, and unsavory material. But what doesn’t get as much attention, but is just as dangerous, is dark data. Dark […]

Five Strategies to Protect Your Company’s Dark Data


Steve Bowcut’s guest for Episode S4E20 is Matt Polak. Matt is the CEO and Founder of Picnic Corporation. Picnic is a cybersecurity firm providing enterprise-wide protection from social engineering. The topic for this episode is The Role of OSINT in Social Engineering and How to Manage Your Human Attack Surface. […]

The Role of OSINT in Social Engineering and How to ...


Approov, creators of advanced mobile app and API shielding security solutions, has named cybersecurity expert Ted Miracco as CEO. He assumes the role from David Stewart, who retires having built Approov into a company with record year-over-year sales growth of 35% in 2022 and recognized technical excellence in securing mobile […]

Approov Names Cybersecurity Executive Ted Miracco CEO



By Vinisha Joshi for GMI Reports Identity and Access Management (IAM) is anticipated to be a key component of the industrial sector’s cyber evolution. Companies are putting more emphasis on user and data security as connected devices proliferate and digital transformation technologies develop in order to restrict access to sensitive […]

Industrial Control Systems (ICS) Security Market revenue to expand US$ ...


By Jonah Nathan, Vice President of Ranger Guard Sensible spending is always essential in business, but every dollar counts more than ever in this shaky economy. In a changing industry and at a time of unprecedented inflation, business leaders are always looking for new ways to save money without compromising […]

The Benefits of Roving Patrol


By Ray Steen, CSO at MainSpring Small businesses spend a lot of money upkeeping legacy IT architecture because they’re afraid to pull the trigger on costly upgrades – 79% of businesses are behind on IT transformation, leading to operational inefficiencies, security vulnerabilities, and higher costs over the long term. Meanwhile, […]

The Most Common Ways Small Businesses Waste Money on IT ...



The world’s only single-step multi-factor authentication (MFA) solution, MIRACL, today unveils a new partnership with UK-based security firm, Buddi.  Buddi provides security products to a wide range of individuals, so a simple solution for all users is best. When they learned about MIRACL, they quickly recognised that its easy usability […]

MIRACL Announces New Partnership With Security Organization, Buddi


By Emily Newton, Editor-in-Chief at Revolutionized Magazine Critical infrastructure cybersecurity is a crucial part of national security today. Sectors like energy and defense are vital to the protection and stability of the nation, but they are facing a growing number of digital threats. With rates of cyber attacks continuing to increase […]

CISA Has New Goals for Critical Infrastructure Cybersecurity


By Kevin Pierce, Chief Operating Officer, VikingCloud As data breach costs hit record highs, Kevin Pierce, Chief Operating Officer of VikingCloud, a leading provider of cybersecurity and compliance solutions, explains the importance of PCI Forensic Investigator Certification, when to engage the services of a PCI Forensic Investigator, and what happens […]

The importance of PCI Forensic Investigator Certification, and what this ...



SAN FRANCISCO, November 29, 2022 — Traceable, the industry’s leading API security and observability company, today announced the appointment of Dr. Jisheng Wang as Head of Artificial Intelligence and Machine Learning and VP of Engineering.  Dr. Wang brings over 15 years of extensive experience to Traceable in developing industry-leading enterprise software and a proven track record of […]

Traceable AI Adds Dr. Jisheng Wang in Dual Leadership Role ...


Our guest for Episode S4E19 is Dr. Carmit Yadin, the Founder & CEO at DeviceTotal—the industry’s first universal repository platform providing security data for devices enabling companies to assess current risks that deployed devices post and potential future risks arising from adding new devices to their networks. The topic for […]

How you can Identify the Security Posture of Your Devices ...


By Bill Kleyman, EVP of Digital Solutions, Switch You know the feeling. You need to connect, there are emails to be checked, and you just need some reliable connectivity. What’s that? An open and unsecured WiFi? Score! Right? Before we dive into the fun conversation of unsecured networks and security, […]

Dirty Networks and Security: It’s Time We Had a Chat