By Emily Newton People within and outside of the health care sector are excited about the potential of precision medicine. They believe that thanks to resources like a patient’s DNA data, it’ll eventually be possible to engineer treatments specifically for them. Additionally, genomic information could help pharmaceutical companies create drugs […]

How Can We Use the Blockchain to Secure Precision Medicine?


In Episode S3E8, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. […]

10 Keys to Preventing Ransomware


A headline out of CyberSN today caught our attention, so we decided to dig a little deeper. Not all press releases warrant an article devoted to their content, but this one does. A new dedicated cybersecurity career marketplace from CyberSN fits nicely to fill a void we have noted and […]

New Dedicated Cybersecurity Career Marketplace



By Emily Newton Cyberattacks are on the minds of every leader, supervisor, and business owner as their prevalence grows. Each year, more and more high-profile attacks sweep across markets, with no industry an exception, including logistics. Cyber pirates have turned their focus to shipping cyber attacks, alongside other mission-critical sectors. […]

5 Ways Shippers Can Prevent Cyber Attacks


By JG Heithcock, GM, Retrospect, a StorCentric company Over the past year, COVID-19 quarantines, lockdowns, and self-imposed isolations sent tens of millions of people around the globe to work, learn and shop from home. A paradigm that is predicted to last in full or hybrid fashion perhaps indefinitely. While many […]

The KISS Principle Still Holds True When It Comes to ...


By Devin Partida, Editor-in-Chief, ReHack.com Cleaning up after a break-in is never easy. In addition to physical damage, the business owner must file reports, close the business temporarily, and investigate replacing stolen goods. It’s possible for any business to deter these break-ins with the right process changes or store upgrades. These […]

6 Ways Businesses Can Deter Break-Ins



In Episode S3E7 our guest is Zack Schuler. Zack is the founder and CEO of NINJIO – a global cybersecurity awareness company that teaches employees and their families how not to get hacked. Zack is an authority on cybersecurity, employee engagement, and related tech issues. He has written for Forbes, […]

Cybersecurity Awareness Training – Why It Works


By Jeff Broth Security testing is crucial, especially as cyber threats continuously evolve with no signs of stopping or slowing down.  To achieve the best outcomes from the security solutions employed in an organization, it is not enough to have the best tools and keep them up to date. There […]

How to Continually Test Security Controls and Boost Security Posture


Data Lab is the first in a series of tools to help security companies make better-informed business decisions through easy access to customizable dashboards monitoring key performance indicators. Montreal, Canada — TrackTik, an innovative and growing security workforce management software provider that helps the physical security industry deliver security services, […]

TrackTik Launches Data Lab to Transform Data into Key Business ...



By Pankaj Singh The global cybersecurity market has established itself as a tremendously lucrative investment avenue in recent years due to the increasing demand for security solutions across several enterprises throughout the world. Several industries and firms spread across the globe are adopting cybersecurity solutions to safeguard their online financial […]

3 Major Trends Influencing the Global Cybersecurity Market Outlook Over ...


By Cyril James The Covid-19 pandemic has brought about an unprecedented crisis in the cybersecurity environment and has confined people to their homes. As a result, work from home has taken precedence, and organizations have adapted quickly to this new change to enable employees to work from home.  This has […]

How to Manage Ransomware Attacks against Your Remote Workforce


By Oren Rofman What are web applications? They are apps that operate on web servers. In contrast to client-based software that needs to be installed on local devices, web apps can be accessed and used through web browsers. This very nature of web apps makes it crucial to ensure their […]

Top Cybersecurity Measures to Protect Web Applications