Sat.Jun 10, 2017 - Fri.Jun 16, 2017

article thumbnail

IBM simplifies identity management in the cloud with new offering

Tech Republic Security

IBM's new Identity Connect is an Identity-as-a-Service (IDaaS) solution that aims to make it easier for business users to access their applications.

165
165
article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Qubes OS 4.2 officials released: The best Linux distributions for privacy and security

Penetration Testing

What is Qubes OS? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft... The post Qubes OS 4.2 officials released: The best Linux distributions for privacy and security appeared first on Penetration Testing.

article thumbnail

Key Milestone Dates: NYDFS Cybersecurity Regulations

NopSec

If you’re in the financial industry (or working as a provider with such organizations), you most likely have already heard about the NY DFS Cybersecurity Regulations. The whole affair started late 2016, and was finally implemented on March 1, 2017. It’s the first regulation of its kind in the United States, and it’s set a precedent for regulations that has since surfaced in other states.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Want a career in cybersecurity? Here are 10 jobs to explore

Tech Republic Security

There are currently 1 million open cybersecurity jobs worldwide. Here are 10 different career options to investigate in the field.

article thumbnail

Five traits employers should look for when hiring cyber security professionals

Tech Republic Security

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

160
160

LifeWorks

More Trending

article thumbnail

Swapping Linux for Windows in Munich too risky after WannaCry attacks, warn Greens

Tech Republic Security

Munich's Green Party says the recent WannaCry ransomware attacks on Windows machines worldwide highlight the danger of the city abandoning its Linux-based OS.

article thumbnail

Fileless malware: An undetectable threat

Tech Republic Security

Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it.

Malware 156
article thumbnail

Malware that took down Ukraine power grid could be used in US, report says

Tech Republic Security

A threat report from security firm Dragos indicates that a malware framework called CRASHOVERRIDE could be behind the 2016 cyberattack in Ukraine, and could come to other countries.

Malware 156
article thumbnail

US indicts North Korea for host of cyberattacks, expects more to come

Tech Republic Security

A North Korean entity called Hidden Cobra was behind a series of cyberattacks in the US using sophisticated tools and targeting a diverse group of entities.

148
148
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

57% of executives trust AI security systems 'as much or more than' humans

Tech Republic Security

Adoption of artificial intelligence for security automation is reaching critical mass, according to a new Radware report, with 81% of executives now relying more heavily on AI solutions.

article thumbnail

Microsoft used AI to combat global tech support scams

Tech Republic Security

As part of a federal crackdown on tech support scams, Microsoft's Digital Crimes Unit relied on artificial intelligence to help track and take down the criminals behind them.

Scams 144
article thumbnail

Microsoft will counter cyberattacks on Windows 10 with AI from Hexadite

Tech Republic Security

Criminals are winning the battle for data access way too often. Microsoft is adding AI and automation to its security platform by acquiring innovations from Hexadite.

144
144
article thumbnail

How to quickly give users sudo privileges in Linux

Tech Republic Security

If you have users that need certain admin privileges on your Linux machines, here's a walk-through of the process for granting full or specific rights.

141
141
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Former US security advisor: Cyberattacks damage society as much as physical infrastructure

Tech Republic Security

At the 2017 Global Cybersecurity Summit in Kiev, Ukraine, Tony Blinken, who was deputy secretary of state to Barack Obama, said the best defenses against cyberattacks are educated consumers and collaborative responses.

Education 141
article thumbnail

Report: 19% of business passwords 'easily compromised'

Tech Republic Security

Nearly one in five enterprise users have passwords that are weak or shared, putting their business at risk for cyber attack, according to a new report from Preempt.

Passwords 141
article thumbnail

New Windows XP patch: Microsoft issues extraordinary fix to protect PCs against next WannaCry

Tech Republic Security

To limit the number of machines at risk from self-replicating malware like WannaCry, Microsoft yesterday patched vulnerabilities on Windows XP and other unsupported operating systems.

Malware 138
article thumbnail

Facebook's secret weapon for fighting terrorists: Human experts and AI working together

Tech Republic Security

Facebook is employing artificial intelligence and counterterrorism experts to combat content around ISIS, Al Qaeda, and other extremist groups on its platform.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

10 elements every production environment must have

Tech Republic Security

One company recently experienced disaster when an employee accidentally destroyed a production database. Here are 10 ways to prevent future scenarios like that.

134
134
article thumbnail

GCS 2017 panel: Are we spending cybersecurity dollars in the right places?

Tech Republic Security

A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine, considers whether the billions of dollars being spent on cybersecurity technology and services have been effective, and where future spending should be directed.

article thumbnail

Android Security Bulletin June 2017: What you need to know

Tech Republic Security

It was a bad month for Qualcomm components in the Android Security Bulletin. Get the highlights.

129
129
article thumbnail

Video: Why employers should seek out "New Collar" workers to fill the cyber-skills job gap

Tech Republic Security

There's a massive workforce shortage in the tech and cybersecurity industry. IBM Security's David Jarvis explains the benefits of hiring employees with a broad range of experience, skills, and aptitudes.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft unveils fingerprint-scanning keyboard for privacy-conscious professionals

Tech Republic Security

Microsoft's $130 Modern Keyboard offers a fingerprint ID system and works with Windows, macOS, Android, and iOS.

113
113
article thumbnail

Video: These are the platforms powering the $455B per year cybercrime industry

Tech Republic Security

Etay Maor Executive Security Advisor at IBM how the same 'trust mechanics' used on e-commerce sites - user reviews, comments, and product ratings - drive the sale of zero days exploits and malware on the Dark Web.

article thumbnail

Video: Ransomware-as-a-service is causing mayhem

Tech Republic Security

Terbium Labs Director of Analysis Emily Wilson explains the Crystal version of the DiamondFox malware, a one-stop shop for keylogging and browser password stealing, DDoS attacks, and RAM scrapers.

DDOS 112
article thumbnail

Why properly educating users is the best defense against future cyberattacks

Tech Republic Security

In an interview at the 2017 Global Cybersecurity Summit, former deputy secretary of state Tony Blinken explained how cyberattacks threaten our thoughts and beliefs, and how to mitigate this threat.

Education 104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GCS 2017 panel: What does the future of IoT look like?

Tech Republic Security

An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discusses what devices might be connected in the future, and what the implications might be for consumers, governments, and industries.

IoT 102
article thumbnail

Video: Is cybersecurity the next big automation frontier?

Tech Republic Security

More and more executives are saying AI-driven cybersecurity tools are trustworthy and reliable. Are we in the midst of an AI security revolution?

article thumbnail

Video: WannaCry is serious enough for Microsoft to patch unsupported Windows systems

Tech Republic Security

Unsupported versions of Windows practically never get patches, but the WannaCry attack is serious enough that they are.

94
article thumbnail

Ransomware: How to avoid becoming a victim

Tech Republic Security

Jack Wallen offers one important thing you can do to avoid getting taken down by ransomware.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!