By Paul Caron, Head of Cybersecurity, Americas at the intelligence and cyber consultancy S-RM Russia has long been home to some of the most skilled hackers in the world. According to research conducted by Chainalysis, 74% of all money made through ransomware attacks in 2021 went to Russia-linked hackers. Their researchers revealed […]

Defying expectations: Why did ransomware attacks dip in July-August 2022, ...


Passwords are a pain. We all know we should use different passwords for every account, but remembering them is nearly impossible. Like most people, you probably have a few favorite passwords you repeatedly use to access dozens or even hundreds of online accounts because you can’t remember more than that. […]

Password Manager and Privileged Access Management in a Single Platform


By Renata Budko, Head of Product at Traceable AI With today’s enterprises, the importance of API security is growing daily due to the extreme pace of API adoption. APIs are fundamentally altering how companies operate both internally and externally. Because more devices and other systems need API-driven solutions, the number […]

Understanding Your API Vulnerabilities and How to Prevent Exploits



By David Weingot, Founder and CEO of DMAC Security Our modern world is full of various types of physical and cyber-related threats. The war in Ukraine is ramping up Russian attacks on American targets, and the talk of a cyberattack is not out of the realm of possibility. It is […]

Why Physical Security Is an Essential Component of a Cybersecurity ...



By Emily Newton, Editor-in-Chief at Revolutionized Magazine Pharmaceutical companies represent a trillion-dollar industry. In 2021, the global pharmaceutical industry was worth $1.42 trillion U.S. dollars. It makes sense that hackers, scammers, and bad actors want a piece of that pie. What are some top cybersecurity challenges the pharmaceutical industry needs to […]

The Top 9 Cybersecurity Challenges Pharma Companies Need to Overcome



In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption. István explains why staying in control of your data is important when collaborating with others and shares how Tresorit’s end-to-end encryption technology protects email and documents. He […]

Encrypted Collaboration


Award-winning cybersecurity company NINJIO will help organizations move toward the next phase of security awareness with cutting-edge, AI-powered cybersecurity technology  LOS ANGELES, CA (October 18, 2022) — NINJIO, a cybersecurity awareness company that leads the industry in customer satisfaction, has acquired DCOYA – an advanced behavior-centric cybersecurity solutions provider. The combination of NINJIO’s engaging cybersecurity content […]

NINJIO Expands Services With Strategic Acquisition Of Innovative Behavior-based Cybersecurity ...


By Zachary Amos, Features Editor at ReHack With cyber theft on the rise, people have started to take their cybersecurity more seriously. Those who often travel, whether for work or leisure, can find themselves susceptible to hackers trying to steal their information. These seven cybersecurity tips will help frequent travelers keep […]

7 Cybersecurity Tips for Frequent Travelers



Peter Braverman, Vice President of Sales for Donnelley Financial Solutions Cybersecurity experts know that threat levels are always changing and evolving. Most people are not aware of the many tricks and tools that hackers have at their disposal. They look for exploits and weak spots in a company’s security measures, […]

Using Artificial Intelligence To Help Keep Your Financial Data Safe


By Dr. Danny Rittman, CTO of GBT Technologies As a greater number of our loved ones are aging, many families are looking for ways to ensure the safety of older relatives who wish to maintain their independence. While a variety of devices out there have the capability to monitor seniors […]

Leveraging Radio Frequency for Home Care


Protecting critical infrastructure is vital to the safety and security of our nation. Without adequate security measures and systems, threat actors would undoubtedly, severely impact essential services such as water, energy, and transportation. If any sector requires the very best in cybersecurity technology, it is critical infrastructure.  Dispersive Holdings Inc. […]

Sustainable Power Infrastructure Gets Military-grade Security Technology