By Emily Newton, Editor-in-Chief of Revolutionized Magazine How data is stored has become an important consideration for businesses. Most companies have the option of choosing between on-site, local storage and off-site solutions like the cloud. Both options have advantages and disadvantages, and neither is necessarily the right choice in every situation. […]

Should Your Business Choose On-Site or Off-Site Servers?


By Devin Partida, Editor-in-Chief, ReHack.com Mail tampering can come as a result of nosy neighbors, curious mail sorters or even possible stalkers. It’s commonly known that going through someone’s mail or delivery is illegal and highly frowned upon. It’s an invasion of privacy and can be deeply unsettling for the person […]

What to Do if Deliveries Look Tampered With


By Rob Shavell, Co-Founder and CEO of Abine/DeleteMe The reality that governments, even democratically elected ones, abuse their citizens’ privacy is unsurprising. However, as the recent Pegasus scandal reveals, the way privacy is infringed upon by authorities who purport to protect it has entered a terrifying new era.  Developed by […]

The Government’s New Outsourced Surveillance Machine



As a leader in cybersecurity certification and education programs, EC-Council recently announced the launch of the 2021 edition of the Certified Ethical Hacker (CEH) Practical Scholarship program.  The program awards $1 Million to the ethical hacking community by providing 2,000 qualified cybersecurity professionals with the chance to hone their skills […]

EC-Council gives back to the Infosec community with a $1 ...


As an app developer, you have a duty to ensure that the service you are providing is as secure as possible. There are several standards that need to be met by your app, and you have no choice but to make sure that you are meeting them. A Secure Piece […]

Why is a High Level of Security a Must for ...


By Rom Hendler, CEO and Co-founder, Trustifi Data protection and regulatory compliance are climbing on just about every organization’s priority list. But there’s a force that often stands in the way of keeping email data safe: people. Employees take shortcuts and create workarounds that they see as simplifying their lives […]

The Top Benefits of Automated Compliance



London, 2021: The 2021 International Security Conference is set to host an impressive line-up of security experts from the British Transport Police, Global Secure Accreditation Ltd, City of London Police and more when it makes its debut at International Security Expo from 28-29 September. Split across two days, the new CPD-certified conference will cover important sector-specific challenges […]

International Security Conference set to make its debut at International ...


GiveEvolv formed to donate Evolv’s state-of-the-art weapons detection at no cost to schools in need. WALTHAM, Mass. — September 8, 2021 — Evolv Technology (NASDAQ: EVLV, “Evolv”), the global leader in weapons detection security screening, today announced it has created Give Evolv LLC, (“GiveEvolv”).   GiveEvolv was established to help accelerate […]

Evolv Technology Forms GiveEvolv to Help End School Gun Violence ...


In Episode S3E10, our guest is Julian Lovelock. Julian is currently Vice President of the Global Business Segment responsible for workforce identity management solutions at HID Global. Part of his role includes sparking new innovation leading to the development of new products and services. Julian moved to the United States […]

What the Future Holds for the “New” Workplace



By Mark Bole, CEO, Quortus Connectivity solutions for many enterprises must meet a number of requirements: robustness, resilience, and consistency. More recently and increasingly so, another important element has been added to this list: infallible security. With regular news of hacks, breaches, and other kinds of cyber-attacks, existing connectivity provision […]

Private Network Solutions – The Answer to Failsafe Security?


In Episode S3E9 we depart from our normal format and interview four guests at once. The panel for this episode is made up of Karen Quatromoni, the Director of PR at Object Management Group, and three co-chairs of the Trustworthiness Task Group for the Industry IoT Consortium, they are: Marcellus […]

Industry IoT Consortium’s Trustworthiness framework foundations


By Devin Partida, Editor-in-Chief, ReHack.com Physical security and cybersecurity used to be separate fields, and most businesses still treat them as such. However, as the internet of things (IoT) has brought the digital and physical worlds together, that’s no longer the case. Reliable security today must combine these two once distinct […]

How to Incorporate Cybersecurity Into Physical Security Strategies