April, 2017

article thumbnail

Do you work in the financial sector? Time to step up your cybersecurity habits

Tech Republic Security

A report from IBM Security revealed a 937% increase in records stolen from the financial sector in 2016. Here's what you need to know and do to protect your sensitive data.

article thumbnail

Kali Linux 2017.1 Release

Kali Linux

Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release , which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages , an updated kernel that provides more and better hardware support, as well as a slew of updated tools - but this release has a few more surprises up its sleeve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

52
article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

Implementing New York DFS Cybersecurity Regulations: Where Are You in the Process?

NopSec

Here at NopSec, we’ve spoken with a number of financial organizations about where they are in the process of meeting the new New York Department of Financial Services (DFS) cybersecurity regulations that went into effect on March 1, 2017. We’ve learned that different companies are in different stages. Some began their preparations before the March 1st effective date, and others are still in the information gathering stage.

CISO 40

More Trending

article thumbnail

Kali Linux Repository HTTPS Support

Kali Linux

A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redirector has not. Now that we generate weekly images, secure access to the mirror redirector has become crucial.

article thumbnail

SpinOne Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive, so now let us introduce you the SpinOne data protection solution that perfectly adds significant value to Google DLP. SpinOne Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss […] The post SpinOne Data Protection: What Is It?

40
article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

RBAC Implementation: Role Based Access Control Implementation

NopSec

Organizations seeking to improve their security posture and meet regulatory or audit compliance requirements must consider implementing role based access control (RBAC). For those of you who don’t know what RBAC is, let me provide a brief definition. RBAC is a method of establishing and controlling user access rights based on a user’s competency, authority, or responsibility within the organization.

article thumbnail

How an IoT DDoS warning system helps predict cyberattacks

Tech Republic Security

Cybercriminals are leveraging vulnerable IoT devices to create massive DDoS botnets. Researchers have devised a platform for early warning and analysis of these cyberattacks.

DDOS 158
article thumbnail

Why businesses have the wrong cybersecurity mindset, and how they can fix it

Tech Republic Security

The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.

article thumbnail

6 common enterprise cybersecurity threats and how to avoid them

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.

IoT 148
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Online shoppers are losing trust in e-commerce, study finds

Tech Republic Security

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.

article thumbnail

Report: Cyberespionage now most popular form of cybercrime in many industries

Tech Republic Security

According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

article thumbnail

Microchip implants help employees access data; experts worry about 'slippery slope' for privacy

Tech Republic Security

A Swedish company offers employees the chance to implant microchips in their hands to simplify access to buildings and carry data. But the implants raise concerns about privacy.

143
143
article thumbnail

4 critical points to consider when receiving cybersecurity and privacy advice

Tech Republic Security

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

New training platform uses real-world situations to train cybersecurity experts faster

Tech Republic Security

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.

article thumbnail

What kinds of people fall prey to identity theft, phishing, and hacks? It's not who you think

Tech Republic Security

Think of an identity theft victim and a few stereotypes probably come to mind, but a new study from CBT Nuggets reveals that the majority of victims are anything but stereotypical.

article thumbnail

5 tips for securing your Docker containers

Tech Republic Security

Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.

126
126
article thumbnail

Win32 is malware? Webroot mistakenly labels Windows as cybersecurity threat

Tech Republic Security

Antivirus provider Webroot recently pushed an updated causing it to read Windows system files as malware and label Facebook a phishing site.

Malware 141
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

How one company wants to replace tech show booth babes with STEAM students

Tech Republic Security

The new STEAM-Con Connection offers cybersecurity vendors an alternative to staffing trade show booths with models. Here's how it works.

article thumbnail

IoT, encryption, and AI lead top security trends for 2017

Tech Republic Security

A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.

article thumbnail

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Security

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.

Big data 134
article thumbnail

IoT company bricks customer's device after negative review

Tech Republic Security

Garadget, which offers an internet-connected garage door opener, recently denied a customer access to its server after he left a negative review. Here's how to respond in a more professional manner.

IoT 122
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

AV-TEST reveals the best backup and data security software

Tech Republic Security

AV-TEST engineers don't think all data protection and backup software is quite ready for prime time. Find out which product received AV-TEST's Approved Backup & Data Security Software certificate.

Backups 120
article thumbnail

Android Security Bulletin April 2017: What you need to know

Tech Republic Security

The April 2017 Android Security Bulletin turned out to be yet another month with the platform once again topping its previous number of critical flaws. Get the highlights.

122
122
article thumbnail

NSA to end warrantless collection of emails and texts about foreign targets

Tech Republic Security

The National Security Agency will stop collecting Americans' emails and texts to people from other countries, and/or those that mention someone who is currently under surveillance.

article thumbnail

Why big vendors could ruin Blockchain by making it a centralized service

Tech Republic Security

Blockchain has huge potential, but the way it's rolling out may be limiting that potential. Curtailing the use of middlemen is key to Blockchain's success.

127
127
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.