Sat.Apr 15, 2017 - Fri.Apr 21, 2017

article thumbnail

4 critical points to consider when receiving cybersecurity and privacy advice

Tech Republic Security

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.

article thumbnail

Implementing New York DFS Cybersecurity Regulations: Where Are You in the Process?

NopSec

Here at NopSec, we’ve spoken with a number of financial organizations about where they are in the process of meeting the new New York Department of Financial Services (DFS) cybersecurity regulations that went into effect on March 1, 2017. We’ve learned that different companies are in different stages. Some began their preparations before the March 1st effective date, and others are still in the information gathering stage.

CISO 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SpinOne Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive, so now let us introduce you the SpinOne data protection solution that perfectly adds significant value to Google DLP. SpinOne Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss […] The post SpinOne Data Protection: What Is It?

40
article thumbnail

New training platform uses real-world situations to train cybersecurity experts faster

Tech Republic Security

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Think that domain you're visiting is legitimate? Think again: Homograph attacks fake secure domains

Tech Republic Security

This devious Unicode-based attack can falsify a domain name, all the way down to secure HTTPS. It isn't just the average user at risk-even seasoned IT pros can fall prey.

Risk 118
article thumbnail

Microsoft patches Shadow Broker exploits: Make sure you apply these updates

Tech Republic Security

Last Friday, Microsoft announced that it had already patched most of the exploits released by Shadow Brokers. Here's what that means for your business.

116
116

More Trending

article thumbnail

Robot crime raises thorny legal issues that need addressing now

Tech Republic Security

A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.

138
138
article thumbnail

5 mobile security precautions nobody should ignore

Tech Republic Security

Mobile security should be on your list of things to take seriously. Jack Wallen tells you why and gives you some tips on making it happen.

Mobile 116
article thumbnail

Facial recognition technology could be used to track visa-holders leaving the US

Tech Republic Security

A new federal program called Biometric Exit would match the photos of visitors flying out of the US to their visa photo, in an effort to curb illegal immigration.

article thumbnail

Video: How a public utility navigates cybersecurity

Tech Republic Security

Eric Slavinsky, CIO for PPL Corporation, explains how the utility works within government regulations to take a risk-based approach to cyber safety.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to share access to your organization's domain, email, and passwords

Tech Republic Security

Don't limit your organization to just one administrator. Share access to ensure continuity of control for your most important accounts.

article thumbnail

Half of all UK businesses experienced a cyber attack in the last year

Tech Republic Security

A new report from the UK Department for Culture, Media and Sport found that fraudulent emails and ransomware were among the most common breaches at UK enterprises. Here's what you need to know.

article thumbnail

Facebook offers account recovery service that's more secure than email

Tech Republic Security

At the annual F8 developers conference, Facebook announced the beta of its Delegated Account Recovery service, which offers a new way to gain access to online accounts.

article thumbnail

Video: Malware in the shadows: Cyberfirms use AI to find hidden threats

Tech Republic Security

Darktrace's Director of Intelligence and Analysis Justin Fier explains how the company uses unsupervised machine learning to detect and deter enterprise cyberattacks.

Malware 64
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to enable phone sign-in for your Microsoft account

Tech Republic Security

Microsoft recently made a new feature available that allows users to authenticate with their smartphone. Here are the details, and how to turn it on.

article thumbnail

RBAC Implementation: Role Based Access Control Implementation

NopSec

Organizations seeking to improve their security posture and meet regulatory or audit compliance requirements must consider implementing role based access control (RBAC). For those of you who don’t know what RBAC is, let me provide a brief definition. RBAC is a method of establishing and controlling user access rights based on a user’s competency, authority, or responsibility within the organization.

article thumbnail

Spinbackup Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive , so now let us introduce you the Spinbackup data protection solution that perfectly adds significant value to Google DLP. Spinbackup Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss disasters in the cloud by letting G Suite administrators back up their sensitive data, identify security risks, and fix them before they become a huge disaster.

Risk 40