Sat.May 14, 2016 - Fri.May 20, 2016

article thumbnail

Cyberwar: The smart person's guide

Tech Republic Security

Armies around the world are gearing up for cyberwarfare: here's what it is and what you need to know.

128
128
article thumbnail

Malware Analysis: Moving Beyond the CVSS Score

NopSec

Note: This article was updated in June 2022. Here at NopSec, we are all about risk — our number one goal as a company to help organizations evaluate and reduce their risk. However, the term “risk” can be highly subjective, making it difficult for organizations to determine the riskiest vulnerabilities. One quantitative measure NopSec employs to help an organization evaluate the risk of a vulnerability is through malware correlation.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity in 2020: The future looks bleak

Tech Republic Security

Experts offer five scenarios they suspect will wreak havoc on cybersecurity by 2020.

article thumbnail

Report: The economy of criminal hackers and how businesses can protect themselves

Tech Republic Security

HPE's new Business of Hacking report takes a look at the underground world of criminal hackers and what steps businesses can take to stay secure.

Hacking 113
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Business ID theft: Slow progress in the battle against fraudsters

Tech Republic Security

Read about the potential devastating effects of business ID theft, and what steps experts are taking to address this issue.

113
113
article thumbnail

How to effectively clear your bash history

Tech Republic Security

If you're serious about security on your Linux machines, you might want to clear the bash history. Learn how to do this more effectively than with just a single command.

107
107