Sat.Mar 18, 2017 - Fri.Mar 24, 2017

article thumbnail

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

Tech Republic Security

Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.

article thumbnail

Application Security Management: Managing Vulnerabilities Throughout Secure SDLC

NopSec

How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Transitioning from my CISO role at DataGravity

Andrew Hay

As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.

CISO 40
article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.

article thumbnail

The 21 best IT and tech memes on the Internet

Tech Republic Security

From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer

Internet 166

More Trending

article thumbnail

Homeland Security ban will limit large electronics on some US-bound international flights

Tech Republic Security

Terrorism threats cited as the reason behind a ban that affects carry-on devices larger than a smartphone, other than those for a medical need. Here's everything business travelers need to know.

113
113
article thumbnail

Use Panopticlick to find out if you've been betrayed by your browser

Tech Republic Security

EFF privacy expert William Budington explains how advertisers use identifiable information inside your browser to reveal your unique digital fingerprint, even when you're surfing in private mode.

article thumbnail

Think your Cisco switch is secure? Think again: Hundreds are vulnerable to a simple attack

Tech Republic Security

The Vault 7 documents released by WikiLeaks continue to reveal security weaknesses in trusted technology. This time it's Cisco's turn to reveal its mistakes to the world.

article thumbnail

How misaligned incentives give hackers an advantage over IT security pros

Tech Republic Security

Find out why black hat hackers always seem to be a step ahead of IT security pros, and what organizations need to do to catch up to cybercriminals.

118
118
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Here are the top 6 ways websites get hacked, according to Google

Tech Republic Security

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.

Hacking 134
article thumbnail

Why top ISPs don't think your web history or app usage is 'sensitive information'

Tech Republic Security

AT&T, Verizon Wireless, T-Mobile USA, and Sprint want the federal government to eliminate broadband privacy rules. Here's what you need to know.

Wireless 113
article thumbnail

How one man's phishing scam cost two major US tech companies $100M

Tech Republic Security

By pretending to be a major supplier, a Lithuanian man recently took two multinational companies for a lot of money. Here's what your business needs to know.

Scams 107
article thumbnail

Maryland man uses Twitter to cause epileptic writer to have a seizure, leading to FBI arrest

Tech Republic Security

In December, a Vanity Fair writer received a tweet containing a seizure-inducing strobe light, demonstrating how tech can be used as a weapon.

113
113
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

New bug lets hackers temporarily kill your Google Nest Cam

Tech Republic Security

A bug in the software powering Google's Nest Cam allows attackers to take the surveillance cameras offline for up to 90 seconds.

article thumbnail

Video: How an 11 year-old helped give cybersecurity a voice with AI

Tech Republic Security

Mike Spisak of IBM Security explains how a hacking experiment with his son Evan turned into IBM's Project Havyn. TechRepublic's Jason Hiner hosted the event at IBM InterConnect.

article thumbnail

How to install Config Server Firewall on CentOS 7

Tech Republic Security

Although the default firewall in CentOS is powerful, there's a more flexible option available. Jack Wallen walks you through the steps for installing Config Server Firewall.

article thumbnail

Video: How blockchain works just like gossip

Tech Republic Security

At IBM InterConnect, Vita Bortnikov, from IBM Research in Haifa, Israel, explained how IBM's Blockchain system is based on "the gossip algorithm." Hosted by TechRepublic's Jason Hiner.

103
103
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?