Sat.Mar 04, 2017 - Fri.Mar 10, 2017

article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

Tails 6.4 releases: privacy-focused operating system based on Debian Linux

Penetration Testing

Tails OS, also known as “The Amnesic Incognito Live System,” is a privacy-focused operating system based on Debian Linux. It is designed to protect your online privacy and anonymity by routing all your internet... The post Tails 6.4 releases: privacy-focused operating system based on Debian Linux appeared first on Cybersecurity News.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deep packet inspection: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.

146
146
article thumbnail

Wikileaks' CIA hacks: Apple says it's already fixed many of the flaws mentioned

Tech Republic Security

A new round of alleged CIA documents were leaked on Tuesday, describing tech tools that allow the agency to hack smartphones and smart TVs. Here's what Apple, Samsung, and Microsoft had to say.

Hacking 138
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The CIA has the key to your IoT, but they should be the least of your concerns

Tech Republic Security

The latest batch of WikiLeaks documents reveals something we've always feared: The government has the means to spy on us using our IoT devices. That means anyone else could too.

IoT 138
article thumbnail

Android Security Bulletin March 2017: What you need to know

Tech Republic Security

The February 2017 Android Security Bulletin turned out to be another month with the platform once again topping its previous number of critical flaws. Get the highlights.

128
128

LifeWorks

More Trending

article thumbnail

How to become a master cyber-sleuth

Tech Republic Security

Digital Guardian's cybersecurity chief explains how to spot intrusions and password dumping programs, locate dropper software, and block secret backdoors in your company's network.

Passwords 128
article thumbnail

Video interview: Why your company should invest in cybersecurity infrastructure

Tech Republic Security

No company is safe from cyberattack, but with the right strategy your company can build robust defenses. Cisco's Trust Strategy Officer Anthony Grieco describes the benefits of a holistic strategy.

article thumbnail

Tails 5.21 releases: privacy & anonymously OS

Penetration Testing

Tails OS is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you... The post Tails 5.21 releases: privacy & anonymously OS appeared first on Penetration Testing.