Sat.May 20, 2017 - Fri.May 26, 2017

article thumbnail

Why Bitdefender Antivirus is a wise choice for Mac users

Tech Republic Security

Recent well-publicized ransomware attacks plagued some Windows users, though Macs aren't immune from malware. Find out how Bitdefender Antivirus can provide Mac users with peace of mind.

Antivirus 144
article thumbnail

President Trump’s Budget Requests $1.5B For Homeland Security Cyber Unit

Privacy and Cybersecurity Law

President Trump’s new budget includes a request to increase cybersecurity personnel and funding across several federal departments, including $1.5 billion for the Department […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 ways to protect your Windows computers against ransomware

Tech Republic Security

The risk of malware infection may be inevitable--but that doesn't mean you can't take steps to protect your Windows computers from attack. Here are 10 measures that will help minimize the threat.

article thumbnail

Why traveling CEOs and coffee shops are your company's greatest security risks

Tech Republic Security

Some 93% of tech decision makers said they are worried about the security challenges posed by an increasingly mobile workforce, according to a new report from iPass.

Risk 135
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How the CISO moved from the basement to the boardroom

Tech Republic Security

A growing threat landscape has changed the role of the chief information security officer in the past decade. Here's why this position and its evolution are vital in the modern enterprise.

CISO 130
article thumbnail

Report: Mobile ransomware attacks 'soared' in 2017, up 250% in Q1

Tech Republic Security

Kaspersky Lab detected more than 479 million malicious attacks from online sources in Q1 2017 alone, according to a new report. Here's how to stay safe.

Mobile 141

More Trending

article thumbnail

Samsung Galaxy S8 iris scanner easily fooled by hackers

Tech Republic Security

The Chaos Computer Club recently posted a video showing how they fooled the iris scanner on Samsung's new flagship phone. The group said that standard PIN systems are more secure.

112
112
article thumbnail

Linux's X.org server is vulnerable. Here's how to stay safe.

Tech Republic Security

Security has come front and center for every aspect of technology — even the display server. Jack Wallen shines a spotlight on the Linux X.org server, why it's insecure, and what you can do.

article thumbnail

How to use Connects to know where your apps are calling out to

Tech Republic Security

If mobile security is important to you, you might want to know what countries are receiving networking packets from your apps. Jack Wallen shows you how with Connects.

Mobile 96
article thumbnail

Citrix looks to cloud, security, analytics to power 'future of work' at Synergy

Tech Republic Security

At the 2017 Citrix Synergy conference, the company announced updates to its digital workspace offering and cloud platform, along with a new analytics service.

95
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Video: How to survive the global cyberwar

Tech Republic Security

Dr. Kenneth Geers, senior research scientist at Comodo and NATO Cyber Center Ambassador, explains #WannaCry and the steps business should take to protect critical assets during the next cyberattack.

73
article thumbnail

Video: Follow these tips to protect your network from ransomware

Tech Republic Security

Ransomware is a growing trend. Here's what you need to do to stop it.

article thumbnail

How Micron is focusing on edge processing for smart IoT deployments

Tech Republic Security

Micron is moving into new markets such as connected vehicles, industrial IoT and smart manufacturing with its connected security and storage solutions, according to Marc Musgrove, head of global PR for Micron.

IoT 65
article thumbnail

Samsung ARTIK SVP explains how to avoid liability from security issues within IoT

Tech Republic Security

Find out how to avoid liability from security issues with IoT devices, as James Stansberry, senior vice president and US head of Samsung ARTIK, talks to TechRepublic at IoT World 2017.

IoT 60
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Gallery: The 25 Fortune 500 companies with the biggest darknet footprint

Tech Republic Security

The darknet is filled with sensitive data stolen from people and organizations. These 25 Fortune 500 companies are the biggest, most enticing targets.

60
article thumbnail

Where are your apps sending data? Connects can tell you.

Tech Republic Security

The Connects app for Android allows you to see what countries are receiving networking packets from your apps.

61
article thumbnail

Video: Which version of Windows was most affected by WannaCry?

Tech Republic Security

Surprisingly enough it's not Windows XP.

70
article thumbnail

Report: The darknet contains a vast treasure trove of stolen Fortune 500 data

Tech Republic Security

OWL Cybersecurity claims to have indexed over 24,000 darknet domains, and every single Fortune 500 company has some degree of exposure. Here's what that means for you.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

President Trump’s Budget Requests $1.5B For Homeland Security Cyber Unit

Privacy and Cybersecurity Law

President Trump’s new budget includes a request to increase cybersecurity personnel and funding across several federal departments, including $1.5 billion for the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD). The NPPD is a DHS unit responsible for protecting US infrastructure from cyber threats.