June, 2017

article thumbnail

Ukraine is a test bed for global cyberattacks that will target major infrastructure

Tech Republic Security

On the ground in Kiev, TechRepublic got a first-hand look at the frontline of a cyberwar that involves alleged Russian state-sponsored hackers, organized crime, and lone-wolf attackers.

167
167
article thumbnail

Introducing Qualys Project Zero?

Scary Beasts Security

Google's Project Zero team was announced in July 2014. Since then, it has become very well known for publishing offensive security research of exceptional quality. This is especially welcome to defenders at a time where top quality offensive security research is drying up. For most important software targets, it's getting harder to find and exploit bugs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s It Like to Join a Startup’s Executive Team?

Lenny Zeltser

Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?

article thumbnail

Kali Drones, Portable CTF Builds, Raspberry Pi Craziness and More!

Kali Linux

The Kali community is a pretty crazy thing. There are folks all over the world doing interesting things with Kali Linux and far too often, these cool projects get overlooked. Part of the problem is that the community is spread out all over the ’net. We’re continuing to help build the Kali community to help with this problem, but that’s a slightly longer topic.

Hacking 52
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

LifeWorks

More Trending

article thumbnail

CASL Private Right of Action Delayed (Indefinitely)

Privacy and Cybersecurity Law

The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.

article thumbnail

The True Cost of A Great Penetration Test

NopSec

If you asked car salesmen from different dealerships the question, “How much does a great car cost?” you’re guaranteed to get different answers and rarely any consistent dollar amount, depending on who they are and the type of person they perceive you to be. “Never buy used American cars. Get Japanese ones. We have some in the lot. Cheap, but it works.

article thumbnail

Qubes OS 4.2 officials released: The best Linux distributions for privacy and security

Penetration Testing

What is Qubes OS? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft... The post Qubes OS 4.2 officials released: The best Linux distributions for privacy and security appeared first on Penetration Testing.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

article thumbnail

Cybercrime industry growing rapidly, cybersecurity can't keep up

Tech Republic Security

IBM's Etay Maor believes businesses must rethink their approach to cybercrime and offers suggestions for how they can protect themselves

article thumbnail

How to set up ssh key authentication

Tech Republic Security

Out of the box, secure shell is fairly secure. With the help of ssh key authentication, you can lock down secure shell so that only specific machines can log in. Here's how.

article thumbnail

The world needs more cybersecurity pros, but millennials aren't interested in the field

Tech Republic Security

Only 7% of cybersecurity workers are under age 29, and just 11% are women. Here's how your business can better recruit younger, more diverse cybersecurity workers.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The 4 types of cybersecurity threats and a formula to fight them

Tech Republic Security

Banks have long been forced to the front lines of cybersecurity and at the 2017 Borderless Cyber event, the CISO of Wells Fargo explained how to pick your battles.

article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

IoT 167
article thumbnail

The next generation of cybersecurity professionals is being created by the Girl Scouts

Tech Republic Security

Girl Scouts of the USA is rolling out a set of 18 new cybersecurity badges next year, to teach young women in grades K-12 programming, ethical hacking, and identity theft prevention.

article thumbnail

Beware that Adobe Flash update on your Android device: It could be malware

Tech Republic Security

A variant of Android malware Marcher has been spotted masquerading as a Flash update. Here's what you need to know about this dangerous, well-disguised threat.

Malware 165
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

IBM simplifies identity management in the cloud with new offering

Tech Republic Security

IBM's new Identity Connect is an Identity-as-a-Service (IDaaS) solution that aims to make it easier for business users to access their applications.

165
165
article thumbnail

Video: GCS 2017 panel: The future of AI and cybersecurity for business

Tech Republic Security

Are artificial intelligence and machine learning just fancy risk vectors or will they drastically reduce risk across all categories? How are we programming machines to program the next line of defense? Is the singularity near?

article thumbnail

Report: 37% of adults at 'serious risk' of being hacked through their IoT devices

Tech Republic Security

Fitness trackers, smart TVs, and children's toys are extremely vulnerable to cyberattacks, but consumers don't know how to protect them, according to a new report from BullGuard.

IoT 164
article thumbnail

Want a career in cybersecurity? Here are 10 jobs to explore

Tech Republic Security

There are currently 1 million open cybersecurity jobs worldwide. Here are 10 different career options to investigate in the field.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Contractors lose jobs after hacking CIA's in-house vending machines

Tech Republic Security

There is some irony in that CIA vending machines were hacked, especially when there may be more at stake than the machines' contents.

Hacking 163
article thumbnail

How to deter hackers: Follow these digital safety best practices

Tech Republic Security

Nothing guarantees perfect online security. But these checklists will help lock down and protect your digital life, keeping you one step ahead of the bad guys.

161
161
article thumbnail

Top 5: Things to know about ransomware

Tech Republic Security

The fight against ransomware is getting tougher. Here are five basics everyone should know about it.

article thumbnail

Report: 10 trends in application security that will impact your cyberdefense strategy

Tech Republic Security

At Infosecurity Europe 2017, High-Tech Bridge reported on the latest cybersecurity trends, touching on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

IoT 161
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Report: 2.5 million people fell victim to ransomware last year, up 11% from 2016

Tech Republic Security

Ransomware attacks continue to rise worldwide, with the US experiencing the most mobile ransomware threats in the past year, according to a new report from Kaspersky Lab.

article thumbnail

iOS and Android security: A timeline of the highlights and the lowlights

Tech Republic Security

iOS and Android security has evolved from nice to have in the platforms' early days to essential. Here's an overview of iOS and Android security features, attacks, and patches through the years.

160
160
article thumbnail

Five traits employers should look for when hiring cyber security professionals

Tech Republic Security

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

160
160
article thumbnail

10 tips to help reduce user account lockouts and password resets

Tech Republic Security

User account administration can waste a lot of precious time and effort, on everyone's part. Here are 10 tips, five for users and five for admins, to reduce the hassle.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.