Sat.Apr 15, 2017 - Fri.Apr 21, 2017

article thumbnail

New training platform uses real-world situations to train cybersecurity experts faster

Tech Republic Security

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.

article thumbnail

Implementing New York DFS Cybersecurity Regulations: Where Are You in the Process?

NopSec

Here at NopSec, we’ve spoken with a number of financial organizations about where they are in the process of meeting the new New York Department of Financial Services (DFS) cybersecurity regulations that went into effect on March 1, 2017. We’ve learned that different companies are in different stages. Some began their preparations before the March 1st effective date, and others are still in the information gathering stage.

CISO 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SpinOne Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive, so now let us introduce you the SpinOne data protection solution that perfectly adds significant value to Google DLP. SpinOne Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss […] The post SpinOne Data Protection: What Is It?

40
article thumbnail

Robot crime raises thorny legal issues that need addressing now

Tech Republic Security

A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.

153
153
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

4 critical points to consider when receiving cybersecurity and privacy advice

Tech Republic Security

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.

article thumbnail

7 tips for effectively rolling out emergency patches

Tech Republic Security

Emergency patches can be stressful and time consuming to deploy. Learn some strategies for doing so in the most effective manner.

144
144

LifeWorks

More Trending

article thumbnail

Think that domain you're visiting is legitimate? Think again: Homograph attacks fake secure domains

Tech Republic Security

This devious Unicode-based attack can falsify a domain name, all the way down to secure HTTPS. It isn't just the average user at risk-even seasoned IT pros can fall prey.

Risk 129
article thumbnail

5 mobile security precautions nobody should ignore

Tech Republic Security

Mobile security should be on your list of things to take seriously. Jack Wallen tells you why and gives you some tips on making it happen.

Mobile 122
article thumbnail

Microsoft patches Shadow Broker exploits: Make sure you apply these updates

Tech Republic Security

Last Friday, Microsoft announced that it had already patched most of the exploits released by Shadow Brokers. Here's what that means for your business.

122
122
article thumbnail

How to share access to your organization's domain, email, and passwords

Tech Republic Security

Don't limit your organization to just one administrator. Share access to ensure continuity of control for your most important accounts.

Passwords 122
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Video: How a public utility navigates cybersecurity

Tech Republic Security

Eric Slavinsky, CIO for PPL Corporation, explains how the utility works within government regulations to take a risk-based approach to cyber safety.

article thumbnail

Half of all UK businesses experienced a cyber attack in the last year

Tech Republic Security

A new report from the UK Department for Culture, Media and Sport found that fraudulent emails and ransomware were among the most common breaches at UK enterprises. Here's what you need to know.

article thumbnail

Facebook offers account recovery service that's more secure than email

Tech Republic Security

At the annual F8 developers conference, Facebook announced the beta of its Delegated Account Recovery service, which offers a new way to gain access to online accounts.

article thumbnail

How to enable phone sign-in for your Microsoft account

Tech Republic Security

Microsoft recently made a new feature available that allows users to authenticate with their smartphone. Here are the details, and how to turn it on.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Video: Malware in the shadows: Cyberfirms use AI to find hidden threats

Tech Republic Security

Darktrace's Director of Intelligence and Analysis Justin Fier explains how the company uses unsupervised machine learning to detect and deter enterprise cyberattacks.

Malware 81
article thumbnail

RBAC Implementation: Role Based Access Control Implementation

NopSec

Organizations seeking to improve their security posture and meet regulatory or audit compliance requirements must consider implementing role based access control (RBAC). For those of you who don’t know what RBAC is, let me provide a brief definition. RBAC is a method of establishing and controlling user access rights based on a user’s competency, authority, or responsibility within the organization.

article thumbnail

Spinbackup Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive , so now let us introduce you the Spinbackup data protection solution that perfectly adds significant value to Google DLP. Spinbackup Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss disasters in the cloud by letting G Suite administrators back up their sensitive data, identify security risks, and fix them before they become a huge disaster.

Risk 40