Sat.May 27, 2017 - Fri.Jun 02, 2017

article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

IoT 160
article thumbnail

Top 3 Cybersecurity Problems That are Solved with E3 Engine and Unified VRM

NopSec

We’re proud to build products IT Security Teams actually need and use on a daily basis. We’re a company started by penetration testers, after all. With boots on the ground and decades of experience, we know the challenges that IT Teams face, and what tools they need to get the job done. There are three specific cybersecurity challenges that we address with our recently released E3 Engine technology and award-winning Unified VRM platform: 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas

Tech Republic Security

Cyberwarfare has begun. Unlike nuclear weapons, cyberweapons can be proliferated more quickly and the threat from accidentally setting them off is even greater.

Hacking 164
article thumbnail

IBM, Cisco partner to help customers in fight against cybercrime

Tech Republic Security

Cisco and IBM have announced a partnership that will see integrations across their products and services as they aim to help customers improve their security posture.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

94% believe unsecured IoT devices could lead to 'catastrophic' cybersecurity attack

Tech Republic Security

A new research report from the Ponemon Institute on third-party IoT integrations shows a strong concern over IoT security, but not many actions taken to mitigate it.

IoT 150
article thumbnail

Simple ways to avoid malware on all your devices

Tech Republic Security

If you work without concern for security, your data will be breeched. Jack Wallen offers up a few bits of advice that will help you to use your devices intelligently and avoid malware.

Malware 143

More Trending

article thumbnail

WannaCry: The smart person's guide

Tech Republic Security

WannaCry, also known as WannaCrypt, has spread around the world through a crafty attack vector and an ability to jump from machine to machine. Here's what you need to know about this evolving threat.

132
132
article thumbnail

How to conduct a production outage post-mortem

Tech Republic Security

Production outages can be stressful, but they can also result in valuable lessons. Here's are some tips on conducting a post-mortem to prevent repeat occurrences.

126
126
article thumbnail

7 ways to protect your Apple computers against ransomware

Tech Republic Security

Take these steps now to protect your Mac computers from emerging ransomware attacks.

article thumbnail

Don't be the weak link that brings us all down: Keep your OS patched and up to date

Tech Republic Security

The worldwide proliferation of WannaCry ransomware exposed a lack of urgency regarding OS security updates. That can't be allowed to happen.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Chrome web pages could secretly be recording audio and video

Tech Republic Security

A Chrome bug, reported by an AOL web developer, would allow websites to record a user without alerting them to the action.

137
137
article thumbnail

Dropbox beefs up security in the cloud with MobileIron integration

Tech Republic Security

On Wednesday, MobileIron Access, the company's multi-cloud security product, integrated with Dropbox Business to secure data in the cloud. Here's what it means for the enterprise.

107
107
article thumbnail

Google looks to machine learning to boost security in Gmail

Tech Republic Security

On Wednesday, Gmail announced several updates that will make your email more difficult to hack. Here's how it can keep your private messages more secure.

Hacking 108
article thumbnail

Video: How enterprise companies can identify and manage emerging cyber-threats

Tech Republic Security

For the enterprise, the cloud is essential for business-but it's also a cybersecurity threat vector. Adobe's chief security officer Brad Arkin explains best practices for CXOs to manage cyber-risk in a multi-cloud environment.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Two exciting breakthroughs in autonomous vehicle cybersecurity, though questions remain

Tech Republic Security

Researchers determine that sensor traffic, such as what's in autonomous vehicles, can be falsified. Discover their proposed solutions to overcome that weakness.

article thumbnail

Video: How companies should respond to cyberattacks by working with law enforcement and regulators

Tech Republic Security

Cybercrime knows no borders. Kim Peretti, co-chair of Alston & Bird's National Security & Digital Crimes Practice explains how digital crime can result in costly legal fees for hacked companies.

article thumbnail

Data center rack doors are having a moment

Tech Republic Security

Racks and their doors are seeing innovations in cooling, security, size, and strength. Who knew?

105
105
article thumbnail

Video: How to navigate the dark web with the Tails Linux distro

Tech Republic Security

Want to access the dark web safely and securely? Here's how to do it with Tails, the Linux distro run from a USB drive.

75
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?