By Mike Ahmad, ACHE, VP of Business Growth & Imaging Technology at ABM Healthcare As increased reliance on Operational Technology (OT) and Internet of Things (IoT) solutions provides welcome ease of use and added connectivity in the healthcare space, it also introduces potential cybersecurity threats that put hospital and patient […]

Healthcare: Enhancing the Patient Experience with Cybersecurity


In Episode S3E14 our guest is Jeff Macre – a Cybersecurity Project Manager at 1898 & Co. and we discuss the critical labor shortage, or skills gap, current in the areas of IT and OT cybersecurity. 1898 & Co. is part of Kansas City, Missouri-based engineering firm Burns & McDonnell […]

Labor Shortage for IT and OT Cybersecurity




By Apu Pavithran, Chief Executive Officer and Founder of Hexnode It has been more than two decades since the term Internet of Things was first coined in 1999. Today, IoT is a paradigm that is converging into every aspect of our lives. Currently, there are more than 13 billion active […]

Securing IoT Devices in a Business Network


By: Zack Schuler, founder and CEO of NINJIO What would you do if your organization was hit by a cyberattack? At a time when reports of major data breaches and other attacks have become constant, this is a question CEOs, CISOs, and employees are increasingly asking themselves. Considering the stratospheric […]

Why a Well-Trained Workforce Is the Best Form of Cyber ...


By Danielle Whittaker, Marketing Executive at Kingdom Services Group When the COVID-19 pandemic hit, no one could predict how things would change. Closures of stores, work-from-home mandates, and limited outside activity meant the world changed nearly overnight. This left some security professionals scrambling. It didn’t come as a surprise when […]

7 Ways Physical Security Has Changed as a Result of ...



By Alan Cunningham The United States’ communications sector faces a variety of threats from multiple different actors, including foreign intelligence entities, organized criminal groups, and terrorist organizations, and methods, such as physical infiltration and the gaining of sensitive data and the electronic hacking into databases to access information or shut […]

The Power to Manipulate and Deceive: Social Media as the ...


The survey, commissioned by Evolv Technology, quantifies the mental toll gun violence takes on Americans. More than half of Americans are willing to go through weapons detection screening at everyday locations, such as the grocery store, workplace, or movie theater. One-third (31%) report increased anxiety when going into a large […]

New Research: 1 out of 5 Americans Believe Their Chances ...


By Rick Bentley, CEO, Cloudastructure Want to see an industry that is a good example of where video surveillance security is headed? Look no further than the cannabis industry. Most states require cannabis businesses to record activity in every area of their enterprise with clear images showing customer and employee activity, plus cash […]

Post-Pandemic Intelligence: Why More Enterprises Are Embracing Cloud-Based Security



In Episode S3E13, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. […]

Cybersecurity Red Flags


Enabling safe, secure, and efficient long-endurance drone operations beyond visual line of sight – in a broad spectrum of industrial and security use cases worldwide. Hamburg/ Germany, 11/14/2021. The two award-winning start-up companies HHLA Sky and Airial Robotics, both from Hamburg, Germany, announce a partnership: They are ready to integrate their outstanding technologies based on innovative […]

HHLA Sky and Airial Robotics: Two award-winning German leaders in ...


One of the oldest techniques for identifying, mapping, and attributing attack methods is deploying honeypots to lure attackers by creating strategically placed fake computing resources. Patterned after the age-old police sting operation, this technique involves deploying traps that appear to be a legitimate part of the infrastructure and contain information […]

Don’t Let Your Distributed Deception Platform Increase Your Risk