By Glenn Murray, CEO at Sapien Cyber Infection is spreading rapidly, and systems are failing. Identifying where the virus has started, how the virus infects others, tracking its movements, and containing the infection need to be done as quickly as possible to minimize impact. Compounding the seriousness of the situation […]

What the Pandemic Can Teach Us About Our Response to ...


By Sergey Ozhegov, CEO of SearchInform “If last year we talked about going remote, today we see that most organisations leave employees the opportunity to work from home permanently or several days a week. We can see this tendency happens to our clients – if in 2019 the companies had […]

How Does the Pandemic Change the Way We Protect Systems ...


By Devin Partida, Editor-in-Chief, ReHack.com As a result of the COVID-19 pandemic, there’s been a sharp increase in the number of remote employees across the globe. Many companies adopted a hybrid approach, where employees come into the office a few days of the week and stay home for others. A major […]

The Ethics of Employee Monitoring



Episode S3E12 features an informative conversation with Slava Bronfman, the Co-founder and CEO at Cybellum. Cybellum is a global leader providing integrated cyber solutions for leading device manufactures, including automobiles. We discuss the cybersecurity risks associated with the automotive industry and what can be done to mitigate those risks. In […]

Automotive Cybersecurity Risks


With cybercrime attacks rising steeply in recent months, revisiting and revising your company’s security strategy is essential By Tim Grieveson, CISO, AVEVA Global cyber breaches have reached record levels in recent months. As the pandemic subsides, new hybrid working models are here to stay – along with a globally widened attack […]

How to Protect Industrial Security in the Age of Hybrid ...




EHR’s Leaky “Last Mile” of Third-Party Apps Exposes Patient Data. Approov Sends FHIR Guard to the Rescue. New findings from Approov and cybersecurity researcher Alissa Knight with Knight Media expose “Last Mile” electronic health record (EHR) security issues in healthcare apps that leave millions of patient healthcare records exposed. The […]

Finding, Fighting FHIR App Vulns


A recent GroupSolver study reveals concern among digital consumers about their personal information being collected and sold, and nearly half are willing to pay platforms to keep their data private.  Rasto Ivanic, Co-founder and CEO of GroupSolver® Every day, users’ online interactions are monitored and stored by technology companies to […]

Selling Privacy Protection Could Be a Win-Win for Big Tech ...


By Julian Lovelock, Vice President, Global Business Segment Identity and Access Management Solutions, HID Global Even before the pandemic changed so much of daily life in so many ways, there was a transformation in workplaces. Physical boundaries were no longer the only perimeter defining secure workplace access. Identity became a […]

Protecting a New Perimeter



By Jeff Broth Distributed denial of service (DDoS) is emerging as a significant concern in internet security now. DDoS is an offshoot of denial of service (DoS) cyber threats that started 20 years ago. “Distributed” in the context of the DDoS attack means that a hacker or group of hackers […]

Distributed Denial of Service: Essential Things to Know


By Rashed Abdel-Tawab, Lead Product Manager, CIS Mobile When Apple recently announced several new features aimed at curbing the distribution of child sexual abuse material (CSAM), the backlash was predictable. Security experts and privacy advocates alike immediately criticized the technology, which enables Apple to scan photos stored in iCloud for […]

Smartphones Putting Government Users at Risk


By John Callahan, Chief Technology Officer, Veridium The 2020 pandemic and resulting work-from-home experience yielded an important conclusion regarding cybersecurity: identity is the new perimeter. Sixty-three percent of all data breaches exploit weak credentials, and incidents like SolarWinds highlight the need to focus cybersecurity on identity and access management (IAM) […]

One Size Doesn’t Fit All – Auth Journeys to Digital ...