Sat.Sep 03, 2016 - Fri.Sep 09, 2016

article thumbnail

Cybersecurity: Understanding the attack kill chain and adversary ecosystem

Tech Republic Security

Security expert Art Gilliland explains what companies can learn from how hackers infiltrate systems, swipe sensitive information, and profit from your company's data.

article thumbnail

Poll: Do you use the Dark Web?

Tech Republic Security

The Dark Web is here to stay. Every day billions of personal records from hacked companies are bought and sold on the encrypted internet. How often do you log on to the Dark Web?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government.

article thumbnail

Report: Despite growing security threats, CXOs struggle to find cybersecurity professionals

Tech Republic Security

According to a new survey, 40% of tech leaders say external security threats are the biggest worry for their company, but that they lack skilled cybersecurity workers.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why a modern security strategy demands endpoint protection

Tech Republic Security

Much of the conversation around microsegmentation has involved network-based solutions. But, the endpoint is a commonly-overlooked area for protection.

72
article thumbnail

How to use EncryptPad for cross-platform file encryption

Tech Republic Security

If you're looking for an incredibly simple solution for file encryption, stop searching and check out EncryptPad.