In Episode S4E3, our guest is Slava Bronfman, CEO and Co-founder at Cybellum and we talk about product supply chain security. Cybellum provides a product security platform, enabling teams to manage security across the entire product lifecycle – from highly detailed SBOMs to automatic vulnerability management, ongoing incident response, and […]

Product Supply Chain Security


BitSight, Black Kite, Panorays, RiskRecon, SecurityScorecard Among “Team of Rivals” Endorsing the New De Facto Standard Shared Assessments introduced the risk industry’s first cybersecurity taxonomy, bringing greater clarity to the definition and identification of cyber events and monitoring surfaces. “A Unified Third Party Continuous Monitoring Cybersecurity Taxonomy” was adopted by […]

Shared Assessments Issues First Ever Unified Third Party Continuous Monitoring ...


By Thomas Johann Lorenz, Co-founder and Managing Partner, Journee It’s official, the metaverse has arrived, and we are on track to making it a permanent part of our lives as an enhancement of our physical reality in the digital world. Other than the internet as we know it today, it […]

How to Ensure the Metaverse Is Safe From Cyber Attacks



In Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance – How and Why.Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How […]

Automated Controls for Compliance – How and Why


Secure Communications Sensor Technologies and Cloud Services for the emerging Industrial Internet of Things (IIoT) market for Commercial Buildings, Agriculture, Critical Infrastructure and Residential On February 22, 2022, one of the unique dates this decade—and, yes, you guessed it, at 2:22 AM—iMatrix Systems announced that the company has emerged from stealth. […]

With a Nod to Twosday, iMatrix Systems Launches From Stealth ...


By Raymond Rangel, Sales Manager at Data Storage Centers. The security of sensitive documents is something that every business owner in any industry should take seriously. You must protect the information of your business and your clients. Business owners have been on the ball lately when it comes to cyber […]

Business Owners: Don’t Neglect Physical Document Security



Cybersecurity awareness training company in a position to capture market share with critical addition to sales team LOS ANGELES, CA (February 16, 2022) — U.S.-based NINJIO, the premier “customer’s choice” cybersecurity awareness training company, announced that SaaS revenue expert Andrew Hahn has joined its executive team as Chief Sales Officer. With over a dozen […]

NINJIO Taps B2B Sales Leader Andrew Hahn As New Chief ...


By Mira Sagrado, Digital Marketing Head, RCBC Bankard When shopping online, most people either use a credit card or a debit card. Some people use both, while others prefer just one. Having a debit card provides many of the same benefits as a credit card. You can use it to […]

Credit Card vs. Debit Card: Which One is Safer Against ...


By Devin Partida, Editor-in-Chief, ReHack.com Hackers and other malicious actors are finding innovative ways to infiltrate the global supply chain. Some are even weaponizing artificial intelligence (AI) to develop advanced malware programs so they can strategically and stealthily execute cyber attacks. Anyone who follows the news understands and feels the effects […]

Why Are Supply Chain Cyber Attacks on the Rise?



By Zachary Amos, Features Editor at ReHack The cloud is key for any business’s digital transformation. However, migrating to the cloud can expose a company to new security threats. Knowing how to identify and fight these risks is essential for any organization that has adopted cloud computing. These are five of […]

Top 5 Threats in Cloud Security and How to Fight ...


In Episode S4E1 our guest is Purandar Das, CEO and Co-Founder at Sotero. We discuss the future of ransomware and explore some recent trends in data security. We touch on topics such as: Anomaly detection at the data level Machine-learning in ransomware protection Possible future trends for ransomware Sotero offers […]

The Future of Ransomware and Trends in Data Security


As a leader in the cybersecurity space, Cyvatar, a transformative cybersecurity as a service (CSaaS) company, prides itself on the quality of its member relationships. In order to continue enhancing the engagement and experience for its current and future members, Cyvatar has appointed Alise Barron, a proven specialist in customer […]

Cyvatar Enhances Its Leadership with Alise Barron Appointment