Sat.Apr 22, 2017 - Fri.Apr 28, 2017

article thumbnail

IoT, encryption, and AI lead top security trends for 2017

Tech Republic Security

A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.

IoT 167
article thumbnail

Kali Linux 2017.1 Release

Kali Linux

Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release , which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages , an updated kernel that provides more and better hardware support, as well as a slew of updated tools - but this release has a few more surprises up its sleeve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

The Shadow Brokers-Leaked Equation Group’s Hacking Tools: A Lab-Demo Analysis

NopSec

According to the The Register’s article , last week we started assisting to the widespread exploitation of The Shadow Brokers ’ leaked Windows exploits, compromising thousands of vulnerable hosts over the Internet. This widespread exploitation prompted me to release this blog post that I have been mulling for a while. As part of the Equation Group’s hacking tools stash, leaked last week by The Shadow Brokers group, this is the latest installment of several leaks featuring network devices vuln

Hacking 52
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Do you work in the financial sector? Time to step up your cybersecurity habits

Tech Republic Security

A report from IBM Security revealed a 937% increase in records stolen from the financial sector in 2016. Here's what you need to know and do to protect your sensitive data.

article thumbnail

Kali Linux Repository HTTPS Support

Kali Linux

A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redirector has not. Now that we generate weekly images, secure access to the mirror redirector has become crucial.

LifeWorks

More Trending

article thumbnail

Online shoppers are losing trust in e-commerce, study finds

Tech Republic Security

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.

article thumbnail

Why businesses have the wrong cybersecurity mindset, and how they can fix it

Tech Republic Security

The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.

article thumbnail

Report: Cyberespionage now most popular form of cybercrime in many industries

Tech Republic Security

According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

article thumbnail

How one company wants to replace tech show booth babes with STEAM students

Tech Republic Security

The new STEAM-Con Connection offers cybersecurity vendors an alternative to staffing trade show booths with models. Here's how it works.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Easy ways to make your Android device more secure

Tech Republic Security

Android security doesn't have to be a challenge. Here are a few simple and quick ways to make ensure your device is secure.

153
153
article thumbnail

Win32 is malware? Webroot mistakenly labels Windows as cybersecurity threat

Tech Republic Security

Antivirus provider Webroot recently pushed an updated causing it to read Windows system files as malware and label Facebook a phishing site.

Malware 153
article thumbnail

AV-TEST reveals the best backup and data security software

Tech Republic Security

AV-TEST engineers don't think all data protection and backup software is quite ready for prime time. Find out which product received AV-TEST's Approved Backup & Data Security Software certificate.

Backups 141
article thumbnail

Video: The top 3 cybersecurity trends to watch in 2017

Tech Republic Security

Forrester just released a list of the top cybersecurity trends for 2017. Here are the top three.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

5 ways to make sure users comply with patch releases

Tech Republic Security

Patching critical vulnerabilities requires both technological and human-oriented solutions. Learn some techniques for maximizing user compliance.

article thumbnail

Texas A&M research team suggests how to defend against collective attention threats

Tech Republic Security

See how cybercriminals craft collective attention threats--and how university researchers plan to get the word out before attacks start.

133
133
article thumbnail

NSA to end warrantless collection of emails and texts about foreign targets

Tech Republic Security

The National Security Agency will stop collecting Americans' emails and texts to people from other countries, and/or those that mention someone who is currently under surveillance.

article thumbnail

Video: How to protect your corporate data while traveling

Tech Republic Security

Open wifi networks can compromise your data, and international customs might lead to a cyber-breach. iJET CEO Bruce McIndoe explains the best ways to take technological precautions while traveling.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Video: How Source Defense protects against third-party vulnerabilities

Tech Republic Security

Malvertising grew by 132% last year. Learn how persistent threat monitoring tools protect companies from cross-site scripting vulnerabilities.

117
117
article thumbnail

Video: The biggest threats to financial institutions

Tech Republic Security

Cyberattacks on financial institutions skyrocketed in 2016. So where are the threats coming from?

81