Sat.Jul 16, 2016 - Fri.Jul 22, 2016

article thumbnail

Video: How ForeScout Technologies fends off cyberattacks at the RNC and DNC

Tech Republic Security

TechRepublic's Dan Patterson talked with ForeScout VP Katherine Gronberg about the biggest cyber threats facing the conventions, and what goes on in the command center where those threats are monitored.

article thumbnail

Hacking with Kali at Black Hat USA 2016

Kali Linux

Kali Linux Dojo, BlackHat 2016 - Las Vegas We have really enjoyed doing the Dojo at Black Hat the last few years. It’s been a great opportunity to show off some of the lesser known (but oh so useful) features of Kali Linux as well as interact with the user base. But one of the limitations of the previous structure was that while this was a hands-on exercise, many attendees moved at different paces from each other.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

article thumbnail

Report: 80% of businesses can't properly manage external cyber attacks

Tech Republic Security

A new report by the Ponemon Institute shows that cyber attacks are costing companies $3.5 million per year, but the majority of businesses don't have the proper strategies to manage these threats.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Android June 2016 Security Bulletin: What you need to know

Tech Republic Security

The Android Security Update for June 2016 includes a number of critical issues. Jack Wallen has the highlights, and shows how to find out if your device is up to date.

66
article thumbnail

Maxthon browser is a wolf in sheep's clothing

Tech Republic Security

You may have installed the Maxthon browser on your mobile devices. If so, here's why you should remove it. Immediately.

Mobile 82

More Trending

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

article thumbnail

WHY CGC MATTERS TO ME

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.