Sat.Sep 03, 2016 - Fri.Sep 09, 2016

article thumbnail

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government.

article thumbnail

Cybersecurity: Understanding the attack kill chain and adversary ecosystem

Tech Republic Security

Security expert Art Gilliland explains what companies can learn from how hackers infiltrate systems, swipe sensitive information, and profit from your company's data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Poll: Do you use the Dark Web?

Tech Republic Security

The Dark Web is here to stay. Every day billions of personal records from hacked companies are bought and sold on the encrypted internet. How often do you log on to the Dark Web?

article thumbnail

Report: Despite growing security threats, CXOs struggle to find cybersecurity professionals

Tech Republic Security

According to a new survey, 40% of tech leaders say external security threats are the biggest worry for their company, but that they lack skilled cybersecurity workers.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Infographic: Businesses are more concerned about security of mobile devices and employee data than cyberwarfare

Tech Republic Security

A recent survey by Tech Pro Research indicates that everyday breaches scare businesses more than hackers, and threats posed by mobile devices and employee data top the list.

Mobile 106
article thumbnail

Why a modern security strategy demands endpoint protection

Tech Republic Security

Much of the conversation around microsegmentation has involved network-based solutions. But, the endpoint is a commonly-overlooked area for protection.

106
106