Sat.Aug 19, 2017 - Fri.Aug 25, 2017

article thumbnail

Musk, tech leaders urge UN to ban AI-powered lethal autonomous weapons

Tech Republic Security

A group of 116 tech executives recently penned an open letter urging the UN to double its efforts protecting against autonomous weapons, which some have called 'killer robots.

165
165
article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR), […].

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The first collision for full SHA-1

Elie

SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks. Despite its deprecation, SHA-1 remains widely used in 2017 for document and TLS certificate signatures, and also in many software such as the GIT versioning system for integrity and backup purposes.

Backups 48
article thumbnail

NYDFS Cybersecurity Regulations: Key Deadlines

NopSec

The first traditional deadline is coming to a close this month for compliance with the NYDFS Cybersecurity Regulations. Please note that situations vary from one organization to another and I urge you to consult an NY DFS expert to help you get the right information for your team and determine which requirements apply exactly to you. For example, the initial 30 day period for filing Notices of Exemption under 23 NYCRR 500.19(e) ends on August 28, 2017.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

What do macOS and Android have in common? Both are booming malware markets

Tech Republic Security

A new report from Malwarebytes reveals Android ransomware rose 137.8% from Q1 to Q2 2017, and macOS malware is at its highest levels ever. Here are the threats the two platforms face.

Malware 150
article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR ), which applies from 25 May 2018. With the introduction of the GDPR, the existing Directive 95/46/EC and its implementation in the local laws of the various EU Member States will be repealed. The GDPR will bring significant and substantial changes with respect to the processing of personal data.

Risk 40

LifeWorks

More Trending

article thumbnail

Video: How IBM plans to use Watson and AI to protect the connected car

Tech Republic Security

IBM Security recently announced new testing focused on cars security and IoT. The services will focus on backend processes, apps, and physical hardware used to control smart systems.

IoT 135
article thumbnail

Want to improve cybersecurity? Try phishing your own employees

Tech Republic Security

Employees are a company's weakest security link. Here's why running internal phishing attacks can strengthen your cybersecurity posture.

Phishing 113
article thumbnail

4 simple steps to cyber safety

Tech Republic Security

Anthony Grieco, senior director and trust strategy officer at Cisco's Security and Trust Organization, explains how companies can improve cybersecurity with these easy tips.

article thumbnail

100% of government IT workers said employees are biggest threat to cybersecurity

Tech Republic Security

Only 14% of government organizations consider themselves to be well-protected against cyber threats, according to a report from Netwrix. Here's why.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

This is when your business is most likely to get hit by malicious spam attacks

Tech Republic Security

New research from IBM determined where, when, and how spammers are most likely to hit your company.

104
104
article thumbnail

Video: Understanding the tech talent shortage

Tech Republic Security

Steve Martino, VP and CISO at Cisco Systems explains why cybersecurity needs to be a core component of every organization, and how to create an effective cybersecurity culture in the office.

CISO 98
article thumbnail

How IBM is using analytics to help companies make better products

Tech Republic Security

Global head of IBM X-Force Red Charles Henderson shares how IBM plans to improve security in connected cars.

90
article thumbnail

IBM taps blockchain to combat food contamination in global supply chain

Tech Republic Security

IBM is partnering with food suppliers including Dole, Nestlé, and Walmart to better regulate food safety using blockchain.

90
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to find fresh tech talent to build your security program

Tech Republic Security

VP and CISO at Cisco Systems Steven Martino gives advice on how companies can build their security programs for the long-term.

CISO 87
article thumbnail

Video: Simple steps to cyber-safety

Tech Republic Security

Anthony Grieco, Senior Director and Trust Strategy Officer at Cisco's Security ant Trust Organization shares two simple things every company should do to improve cybersecurity