Sat.Aug 19, 2017 - Fri.Aug 25, 2017

article thumbnail

Musk, tech leaders urge UN to ban AI-powered lethal autonomous weapons

Tech Republic Security

A group of 116 tech executives recently penned an open letter urging the UN to double its efforts protecting against autonomous weapons, which some have called 'killer robots.

144
144
article thumbnail

The first collision for full SHA-1

Elie

SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks. Despite its deprecation, SHA-1 remains widely used in 2017 for document and TLS certificate signatures, and also in many software such as the GIT versioning system for integrity and backup purposes.

Backups 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR), […].

52
article thumbnail

NYDFS Cybersecurity Regulations: Key Deadlines

NopSec

The first traditional deadline is coming to a close this month for compliance with the NYDFS Cybersecurity Regulations. Please note that situations vary from one organization to another and I urge you to consult an NY DFS expert to help you get the right information for your team and determine which requirements apply exactly to you. For example, the initial 30 day period for filing Notices of Exemption under 23 NYCRR 500.19(e) ends on August 28, 2017.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

What do macOS and Android have in common? Both are booming malware markets

Tech Republic Security

A new report from Malwarebytes reveals Android ransomware rose 137.8% from Q1 to Q2 2017, and macOS malware is at its highest levels ever. Here are the threats the two platforms face.

Malware 129
article thumbnail

4 simple steps to cyber safety

Tech Republic Security

Anthony Grieco, senior director and trust strategy officer at Cisco's Security and Trust Organization, explains how companies can improve cybersecurity with these easy tips.

More Trending

article thumbnail

Want to improve cybersecurity? Try phishing your own employees

Tech Republic Security

Employees are a company's weakest security link. Here's why running internal phishing attacks can strengthen your cybersecurity posture.

Phishing 113
article thumbnail

100% of government IT workers said employees are biggest threat to cybersecurity

Tech Republic Security

Only 14% of government organizations consider themselves to be well-protected against cyber threats, according to a report from Netwrix. Here's why.

article thumbnail

Video: How IBM plans to use Watson and AI to protect the connected car

Tech Republic Security

IBM Security recently announced new testing focused on cars security and IoT. The services will focus on backend processes, apps, and physical hardware used to control smart systems.

IoT 89
article thumbnail

Video: Understanding the tech talent shortage

Tech Republic Security

Steve Martino, VP and CISO at Cisco Systems explains why cybersecurity needs to be a core component of every organization, and how to create an effective cybersecurity culture in the office.

CISO 72
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

This is when your business is most likely to get hit by malicious spam attacks

Tech Republic Security

New research from IBM determined where, when, and how spammers are most likely to hit your company.

96
article thumbnail

Video: Simple steps to cyber-safety

Tech Republic Security

Anthony Grieco, Senior Director and Trust Strategy Officer at Cisco's Security ant Trust Organization shares two simple things every company should do to improve cybersecurity

article thumbnail

IBM taps blockchain to combat food contamination in global supply chain

Tech Republic Security

IBM is partnering with food suppliers including Dole, Nestlé, and Walmart to better regulate food safety using blockchain.

76
article thumbnail

How to find fresh tech talent to build your security program

Tech Republic Security

VP and CISO at Cisco Systems Steven Martino gives advice on how companies can build their security programs for the long-term.

CISO 73
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How IBM is using analytics to help companies make better products

Tech Republic Security

Global head of IBM X-Force Red Charles Henderson shares how IBM plans to improve security in connected cars.

76
article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR ), which applies from 25 May 2018. With the introduction of the GDPR, the existing Directive 95/46/EC and its implementation in the local laws of the various EU Member States will be repealed. The GDPR will bring significant and substantial changes with respect to the processing of personal data.

Risk 40