Sat.Mar 04, 2017 - Fri.Mar 10, 2017

article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

Tails 5.21 releases: privacy & anonymously OS

Penetration Testing

Tails OS is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you... The post Tails 5.21 releases: privacy & anonymously OS appeared first on Penetration Testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deep packet inspection: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.

129
129
article thumbnail

The CIA has the key to your IoT, but they should be the least of your concerns

Tech Republic Security

The latest batch of WikiLeaks documents reveals something we've always feared: The government has the means to spy on us using our IoT devices. That means anyone else could too.

IoT 124
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Wikileaks' CIA hacks: Apple says it's already fixed many of the flaws mentioned

Tech Republic Security

A new round of alleged CIA documents were leaked on Tuesday, describing tech tools that allow the agency to hack smartphones and smart TVs. Here's what Apple, Samsung, and Microsoft had to say.

Hacking 122
article thumbnail

How to become a master cyber-sleuth

Tech Republic Security

Digital Guardian's cybersecurity chief explains how to spot intrusions and password dumping programs, locate dropper software, and block secret backdoors in your company's network.

Passwords 117

More Trending

article thumbnail

Video: Top 5 ways to protect yourself from data breaches

Tech Republic Security

It's nearly impossible to avoid data breaches, but here are five ways to protect yourself from the main threats.

article thumbnail

Video interview: Why your company should invest in cybersecurity infrastructure

Tech Republic Security

No company is safe from cyberattack, but with the right strategy your company can build robust defenses. Cisco's Trust Strategy Officer Anthony Grieco describes the benefits of a holistic strategy.