Sat.May 27, 2017 - Fri.Jun 02, 2017

article thumbnail

7 ways to protect your Apple computers against ransomware

Tech Republic Security

Take these steps now to protect your Mac computers from emerging ransomware attacks.

article thumbnail

Top 3 Cybersecurity Problems That are Solved with E3 Engine and Unified VRM

NopSec

We’re proud to build products IT Security Teams actually need and use on a daily basis. We’re a company started by penetration testers, after all. With boots on the ground and decades of experience, we know the challenges that IT Teams face, and what tools they need to get the job done. There are three specific cybersecurity challenges that we address with our recently released E3 Engine technology and award-winning Unified VRM platform: 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

IoT 167
article thumbnail

Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas

Tech Republic Security

Cyberwarfare has begun. Unlike nuclear weapons, cyberweapons can be proliferated more quickly and the threat from accidentally setting them off is even greater.

Hacking 165
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

IBM, Cisco partner to help customers in fight against cybercrime

Tech Republic Security

Cisco and IBM have announced a partnership that will see integrations across their products and services as they aim to help customers improve their security posture.

article thumbnail

94% believe unsecured IoT devices could lead to 'catastrophic' cybersecurity attack

Tech Republic Security

A new research report from the Ponemon Institute on third-party IoT integrations shows a strong concern over IoT security, but not many actions taken to mitigate it.

IoT 160

LifeWorks

More Trending

article thumbnail

How to protect Samba from the SambaCry exploit

Tech Republic Security

If you make use of a Linux server to share out directories and files, you'll want to make sure you do everything you can to prevent the likes of SambaCry. Here are a few tips.

155
155
article thumbnail

Chrome web pages could secretly be recording audio and video

Tech Republic Security

A Chrome bug, reported by an AOL web developer, would allow websites to record a user without alerting them to the action.

150
150
article thumbnail

Don't be the weak link that brings us all down: Keep your OS patched and up to date

Tech Republic Security

The worldwide proliferation of WannaCry ransomware exposed a lack of urgency regarding OS security updates. That can't be allowed to happen.

article thumbnail

How to conduct a production outage post-mortem

Tech Republic Security

Production outages can be stressful, but they can also result in valuable lessons. Here's are some tips on conducting a post-mortem to prevent repeat occurrences.

146
146
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

WannaCry: The smart person's guide

Tech Republic Security

WannaCry, also known as WannaCrypt, has spread around the world through a crafty attack vector and an ability to jump from machine to machine. Here's what you need to know about this evolving threat.

144
144
article thumbnail

Data center rack doors are having a moment

Tech Republic Security

Racks and their doors are seeing innovations in cooling, security, size, and strength. Who knew?

138
138
article thumbnail

Google looks to machine learning to boost security in Gmail

Tech Republic Security

On Wednesday, Gmail announced several updates that will make your email more difficult to hack. Here's how it can keep your private messages more secure.

Hacking 134
article thumbnail

Two exciting breakthroughs in autonomous vehicle cybersecurity, though questions remain

Tech Republic Security

Researchers determine that sensor traffic, such as what's in autonomous vehicles, can be falsified. Discover their proposed solutions to overcome that weakness.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Dropbox beefs up security in the cloud with MobileIron integration

Tech Republic Security

On Wednesday, MobileIron Access, the company's multi-cloud security product, integrated with Dropbox Business to secure data in the cloud. Here's what it means for the enterprise.

129
129
article thumbnail

Video: How enterprise companies can identify and manage emerging cyber-threats

Tech Republic Security

For the enterprise, the cloud is essential for business-but it's also a cybersecurity threat vector. Adobe's chief security officer Brad Arkin explains best practices for CXOs to manage cyber-risk in a multi-cloud environment.

article thumbnail

Video: How companies should respond to cyberattacks by working with law enforcement and regulators

Tech Republic Security

Cybercrime knows no borders. Kim Peretti, co-chair of Alston & Bird's National Security & Digital Crimes Practice explains how digital crime can result in costly legal fees for hacked companies.

article thumbnail

Video: How to navigate the dark web with the Tails Linux distro

Tech Republic Security

Want to access the dark web safely and securely? Here's how to do it with Tails, the Linux distro run from a USB drive.

109
109
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.