Fileless malware: An undetectable threat
Tech Republic Security
JUNE 15, 2017
Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it.
Tech Republic Security
JUNE 15, 2017
Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it.
Elie
JUNE 10, 2017
This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Penetration Testing
JUNE 15, 2017
What is Qubes OS? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft... The post Qubes OS 4.2 officials released: The best Linux distributions for privacy and security appeared first on Penetration Testing.
NopSec
JUNE 14, 2017
If you’re in the financial industry (or working as a provider with such organizations), you most likely have already heard about the NY DFS Cybersecurity Regulations. The whole affair started late 2016, and was finally implemented on March 1, 2017. It’s the first regulation of its kind in the United States, and it’s set a precedent for regulations that has since surfaced in other states.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
JUNE 13, 2017
Munich's Green Party says the recent WannaCry ransomware attacks on Windows machines worldwide highlight the danger of the city abandoning its Linux-based OS.
Tech Republic Security
JUNE 15, 2017
If you're wondering what important steps you can take to avoid getting taken down by ransomware, Jack Wallen offers up one tip that will go a very long way.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JUNE 13, 2017
IBM's new Identity Connect is an Identity-as-a-Service (IDaaS) solution that aims to make it easier for business users to access their applications.
Tech Republic Security
JUNE 15, 2017
There are currently 1 million open cybersecurity jobs worldwide. Here are 10 different career options to investigate in the field.
Tech Republic Security
JUNE 14, 2017
When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.
Tech Republic Security
JUNE 16, 2017
As part of a federal crackdown on tech support scams, Microsoft's Digital Crimes Unit relied on artificial intelligence to help track and take down the criminals behind them.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
JUNE 14, 2017
To limit the number of machines at risk from self-replicating malware like WannaCry, Microsoft yesterday patched vulnerabilities on Windows XP and other unsupported operating systems.
Tech Republic Security
JUNE 12, 2017
Criminals are winning the battle for data access way too often. Microsoft is adding AI and automation to its security platform by acquiring innovations from Hexadite.
Tech Republic Security
JUNE 15, 2017
At the 2017 Global Cybersecurity Summit in Kiev, Ukraine, Tony Blinken, who was deputy secretary of state to Barack Obama, said the best defenses against cyberattacks are educated consumers and collaborative responses.
Tech Republic Security
JUNE 14, 2017
A North Korean entity called Hidden Cobra was behind a series of cyberattacks in the US using sophisticated tools and targeting a diverse group of entities.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Tech Republic Security
JUNE 14, 2017
Nearly one in five enterprise users have passwords that are weak or shared, putting their business at risk for cyber attack, according to a new report from Preempt.
Tech Republic Security
JUNE 15, 2017
If you have users that need certain admin privileges on your Linux machines, here's a walk-through of the process for granting full or specific rights.
Tech Republic Security
JUNE 12, 2017
There's a massive workforce shortage in the tech and cybersecurity industry. IBM Security's David Jarvis explains the benefits of hiring employees with a broad range of experience, skills, and aptitudes.
Tech Republic Security
JUNE 14, 2017
Adoption of artificial intelligence for security automation is reaching critical mass, according to a new Radware report, with 81% of executives now relying more heavily on AI solutions.
Speaker: Blackberry, OSS Consultants, & Revenera
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
Tech Republic Security
JUNE 13, 2017
Etay Maor Executive Security Advisor at IBM how the same 'trust mechanics' used on e-commerce sites - user reviews, comments, and product ratings - drive the sale of zero days exploits and malware on the Dark Web.
Tech Republic Security
JUNE 16, 2017
A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine, considers whether the billions of dollars being spent on cybersecurity technology and services have been effective, and where future spending should be directed.
Tech Republic Security
JUNE 16, 2017
One company recently experienced disaster when an employee accidentally destroyed a production database. Here are 10 ways to prevent future scenarios like that.
Tech Republic Security
JUNE 15, 2017
In an interview at the 2017 Global Cybersecurity Summit, former deputy secretary of state Tony Blinken explained how cyberattacks threaten our thoughts and beliefs, and how to mitigate this threat.
Advertisement
Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.
Tech Republic Security
JUNE 15, 2017
Terbium Labs Director of Analysis Emily Wilson explains the Crystal version of the DiamondFox malware, a one-stop shop for keylogging and browser password stealing, DDoS attacks, and RAM scrapers.
Tech Republic Security
JUNE 16, 2017
Microsoft's $130 Modern Keyboard offers a fingerprint ID system and works with Windows, macOS, Android, and iOS.
Tech Republic Security
JUNE 15, 2017
Facebook is employing artificial intelligence and counterterrorism experts to combat content around ISIS, Al Qaeda, and other extremist groups on its platform.
Tech Republic Security
JUNE 13, 2017
It was a bad month for Qualcomm components in the Android Security Bulletin. Get the highlights.
Speaker: Erika R. Bales, Esq.
When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.
Tech Republic Security
JUNE 16, 2017
An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discusses what devices might be connected in the future, and what the implications might be for consumers, governments, and industries.
Tech Republic Security
JUNE 13, 2017
More and more executives are saying AI-driven cybersecurity tools are trustworthy and reliable. Are we in the midst of an AI security revolution?
Tech Republic Security
JUNE 13, 2017
Unsupported versions of Windows practically never get patches, but the WannaCry attack is serious enough that they are.
Tech Republic Security
JUNE 13, 2017
Hidden Cobra, a North Korean-backed hacking group, may also be responsible for WannaCry and the Sony Pictures hack.
Speaker: William Hord, Vice President of ERM Services
A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.
Let's personalize your content