Ransomware: The smart person's guide
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Tech Republic Security
AUGUST 23, 2016
Jack Wallen explains why the recently discovered SpyNote malware threat should make you squeamish about sideloading Android apps.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
AUGUST 26, 2016
Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.
Tech Republic Security
AUGUST 23, 2016
As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
AUGUST 24, 2016
Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.
Tech Republic Security
AUGUST 22, 2016
Australia's government-owned postal service recently announced plans to test digital voting via blockchain technology to increase efficiency.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
AUGUST 22, 2016
The Stagefright vulnerability on Android phones was one of the top security stories of 2015. Here's where it stands now and how users can protect their devices.
Tech Republic Security
AUGUST 26, 2016
The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.
Tech Republic Security
AUGUST 24, 2016
Checking the length of your DKIM key and generating a new, 2048-bit one could help prevent spoofing and spam. Here's the process for Google Apps admins.
Tech Republic Security
AUGUST 24, 2016
Tresorit is one of the best cloud solutions contributing writer Jack Wallen has tried in a long time. Find out what makes this enterprise cloud offering a dazzler.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
AUGUST 26, 2016
Duo Insight lets IT teams run internal phishing simulations to identify potential security weaknesses and make the case for investing in stronger solutions and more user training.
Tech Republic Security
AUGUST 24, 2016
San Francisco's Chronicled announced that it has partnered with Ethereum to provide a registry for connected devices built on blockchain technology.
Let's personalize your content