How to establish strong microservice security using SSL, TLS and API gateways
Tech Republic Security
MARCH 23, 2017
Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.
Tech Republic Security
MARCH 23, 2017
Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.
NopSec
MARCH 23, 2017
How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Andrew Hay
MARCH 20, 2017
As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.
Tech Republic Security
MARCH 24, 2017
From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
MARCH 24, 2017
A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.
Tech Republic Security
MARCH 22, 2017
Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
MARCH 22, 2017
Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.
Tech Republic Security
MARCH 21, 2017
Terrorism threats cited as the reason behind a ban that affects carry-on devices larger than a smartphone, other than those for a medical need. Here's everything business travelers need to know.
Tech Republic Security
MARCH 20, 2017
Find out why black hat hackers always seem to be a step ahead of IT security pros, and what organizations need to do to catch up to cybercriminals.
Tech Republic Security
MARCH 20, 2017
EFF privacy expert William Budington explains how advertisers use identifiable information inside your browser to reveal your unique digital fingerprint, even when you're surfing in private mode.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
MARCH 23, 2017
Although the default firewall in CentOS is powerful, there's a more flexible option available. Jack Wallen walks you through the steps for installing Config Server Firewall.
Tech Republic Security
MARCH 22, 2017
By pretending to be a major supplier, a Lithuanian man recently took two multinational companies for a lot of money. Here's what your business needs to know.
Tech Republic Security
MARCH 21, 2017
A bug in the software powering Google's Nest Cam allows attackers to take the surveillance cameras offline for up to 90 seconds.
Tech Republic Security
MARCH 20, 2017
AT&T, Verizon Wireless, T-Mobile USA, and Sprint want the federal government to eliminate broadband privacy rules. Here's what you need to know.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
MARCH 24, 2017
At IBM InterConnect, Vita Bortnikov, from IBM Research in Haifa, Israel, explained how IBM's Blockchain system is based on "the gossip algorithm." Hosted by TechRepublic's Jason Hiner.
Tech Republic Security
MARCH 22, 2017
The Vault 7 documents released by WikiLeaks continue to reveal security weaknesses in trusted technology. This time it's Cisco's turn to reveal its mistakes to the world.
Tech Republic Security
MARCH 20, 2017
In December, a Vanity Fair writer received a tweet containing a seizure-inducing strobe light, demonstrating how tech can be used as a weapon.
Tech Republic Security
MARCH 24, 2017
Mike Spisak of IBM Security explains how a hacking experiment with his son Evan turned into IBM's Project Havyn. TechRepublic's Jason Hiner hosted the event at IBM InterConnect.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Let's personalize your content