May, 2016

article thumbnail

Computer science teachers need cybersecurity education says CSTA industry group

Tech Republic Security

The Computer Science Teachers Association (CTSA) is working on a cybersecurity certification program for computer science educators, so they can better teach students about computer security.

Education 113
article thumbnail

3 Ways to Go Beyond HIPAA Compliance

NopSec

Compliance isn’t enough for healthcare organizations. For years, we have equated compliance with effective vulnerability risk management. This is simply not the case. Recent highly publicized data breaches in major hospitals show that minimum compliance is not effective when protecting your data. In fact, it’s not just major healthcare organizations that get attacked, but virtually all hospitals have been victims of a cyber attack (commonly ransomware) at some point in varying degrees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Office of the Privacy Commissioner announces first investigation under the address harvesting provisions

Privacy and Cybersecurity Law

Today, the Office of the Privacy Commissioner (OPC) announced its report of findings against Compu-Finder, a Quebec-based company that offers […].

article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 52
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft believes blockchain tech could help fight human trafficking, child exploitation

Tech Republic Security

Microsoft is partnering with ConsenSys and Blockstack Labs to build an open source, blockchain-based identity system to help provide legal identification for people around the world.

110
110
article thumbnail

Russian facial recognition program beats Google, but big privacy questions linger

Tech Republic Security

NTechLab's facial recognition app uses AI to identify a face among billions of photos in less than a second, and is one of the best in the world, but the Russian startup draws concerns from academics.

106
106

More Trending

article thumbnail

Businesses beware: the 'industrial internet of things' is a prime target for cyberattacks

Tech Republic Security

Think your Amazon Echo or Samsung Smart TV are IoT security threats? Businesses using the 'industrial internet of things' are even bigger targets for cyberattacks.

Internet 107
article thumbnail

11+ security questions to consider during an IT risk assessment

Tech Republic Security

IT risk assessments are crucial to minimize the fallout from cyberattacks. Experts explain why and suggest what questions to consider to assess your company's risk.

Risk 105
article thumbnail

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

Tech Republic Security

The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.

Hacking 110
article thumbnail

5 ways to secure OS X

Tech Republic Security

With OS X security exploits on the rise, Jesus Vigo takes a look at 5 ways to better protect your Mac from malware infections and data loss.

Malware 112
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CompTIA report: Almost half of companies believe their security is 'good enough'

Tech Republic Security

A recent security report from CompTIA found that while threats are growing stronger, many enterprises still aren't ready to face them.

109
109
article thumbnail

How to easily encrypt/decrypt a file in Linux with gpg

Tech Republic Security

Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.

article thumbnail

Report: The economy of criminal hackers and how businesses can protect themselves

Tech Republic Security

HPE's new Business of Hacking report takes a look at the underground world of criminal hackers and what steps businesses can take to stay secure.

Hacking 94
article thumbnail

5 more ways to secure OS X

Tech Republic Security

Apple devices aren't impervious to threats against your data. Here are 5 more methods for keeping your information safe.

103
103
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cyberwar: The smart person's guide

Tech Republic Security

Armies around the world are gearing up for cyberwarfare: here's what it is and what you need to know.

111
111
article thumbnail

Are you being exploited by online marketers using "tricks for clicks"?

Tech Republic Security

By definition, marketing is all about getting people to do something. Make sure the "doing something" is your decision and not the marketers'.

article thumbnail

Malware goes to war: Potential tools, uses, and targets of cyberweapons

Tech Republic Security

Researchers look at what it means when cyberweapons have the same status as traditional weapons of war.

Malware 97
article thumbnail

Business ID theft: Slow progress in the battle against fraudsters

Tech Republic Security

Read about the potential devastating effects of business ID theft, and what steps experts are taking to address this issue.

87
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Android Security Update May 2016: What you need to know

Tech Republic Security

The Android Security Update for May 2016 includes a number of critical issues. Jack Wallen has the highlights, and shows how to find out if your device is up to date.

72
article thumbnail

Cybersecurity in 2020: The future looks bleak

Tech Republic Security

Experts offer five scenarios they suspect will wreak havoc on cybersecurity by 2020.

article thumbnail

Samsung Knox isn't as secure as you think it is

Tech Republic Security

Israeli researchers recently found a slew of security flaws in the Samsung Knox security system commonly used in Android phones.

79
article thumbnail

ImageMagick users beware: Multiple vulnerabilities leave servers compromised

Tech Republic Security

The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.

63
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Potential IoT legal challenges should be on your enterprise radar

Tech Republic Security

Lack of existing case law may fuel legal battles in which companies in the IoT market will have the most to lose.

IoT 76
article thumbnail

How public cloud providers are making security a non-issue for app developers

Tech Republic Security

Developers would often rather write apps than secure them, but public cloud providers can help them do both.

76
article thumbnail

How to add a simple password manager to Ubuntu Touch

Tech Republic Security

For an easy-to-use password manager for the Ubuntu Touch platform, Jack Wallen recommends the no-frills app password-shroud.

article thumbnail

SMBs: Most Likely To Be Hacked?

NopSec

Most small and medium business owners believe that cyber criminals only target large businesses and corporations. They couldn’t be more wrong. In 2015, 62% of all data breaches were against SMBs according to IBM and the Ponemon Institute. Considering that a majority of business entities in the United States are small and medium businesses, and most of them do not have robust information security programs in place, there is definitely an incentive in targeting SMBs instead.

Hacking 52
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Malware Analysis: Moving Beyond the CVSS Score

NopSec

Note: This article was updated in June 2022. Here at NopSec, we are all about risk — our number one goal as a company to help organizations evaluate and reduce their risk. However, the term “risk” can be highly subjective, making it difficult for organizations to determine the riskiest vulnerabilities. One quantitative measure NopSec employs to help an organization evaluate the risk of a vulnerability is through malware correlation.

Malware 52
article thumbnail

LIVE STREAMING SECURITY GAMES

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40
article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40
article thumbnail

How to effectively clear your bash history

Tech Republic Security

If you're serious about security on your Linux machines, you might want to clear the bash history. Learn how to do this more effectively than with just a single command.

75
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.