Sat.Feb 11, 2017 - Fri.Feb 17, 2017

article thumbnail

Big data privacy is a bigger issue than you think

Tech Republic Security

When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.

Big data 167
article thumbnail

Phishing: What Everyone in Your Organization Needs to Know

NopSec

Do you feel confident that everyone in your organization could identify a phishing email that contained ransomware? What if the recipient is in a hurry and under a lot of stress – will they be aware of how sophisticated and authentic-looking a well-crafted whaling attack can be? In today’s post, we share information with the goal that it will help everyone in your organization protect themselves from phishing attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 tips to help your business recruit, and keep, cybersecurity pros

Tech Republic Security

According to a new report from ISACA, 27% of US companies are unable to fill cybersecurity positions, and most applicants aren't qualified for the job. Here's how to better recruit cyber professionals.

article thumbnail

IBM uses Watson to fill cybersecurity gaps

Tech Republic Security

IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Free charging stations can hack your phone, here's how to protect yourself

Tech Republic Security

A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.

Hacking 161
article thumbnail

How to install and use Let's Encrypt on a Ubuntu Server for SSL security

Tech Republic Security

If you're looking for an easy way to install SSL certificates on your Ubuntu Server, follow this incredibly simple process to use Let's Encrypt.

LifeWorks

More Trending

article thumbnail

How to make Apache more secure by hiding directory folders

Tech Republic Security

If you serve up your websites with Apache, you might want to prevent the server from listing subdirectories. Here are two simple tricks for securing your Apache server.

144
144
article thumbnail

Report: Data breaches growing more complex, causing more damage

Tech Republic Security

Verizon's latest Data Breach Digest report claims that data breaches are affecting more parts of organizations and becoming more sophisticated. Here's how you can respond.

article thumbnail

RSA Conference: HPE looks to boost enterprise IoT security with Apache NiFi

Tech Republic Security

HPE's SecureData for Hadoop and IoT, unveiled at RSA, aims to protect sensitive IoT data at rest, in transit, and in use.

IoT 141
article thumbnail

RSA Conference: New ransomware could poison your town's water supply if you don't pay up

Tech Republic Security

Researchers at Georgia Tech have created a new form of ransomware specifically to target industrial systems, that disrupted a simulated water treatment plant.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Personal vs. corporate email: The security threats differ, says Google

Tech Republic Security

Hackers differ their approach based on who they're attacking. Here's what that means for your unique situation.

122
122
article thumbnail

How Duo Beyond wants to remove the network perimeter and get rid of the VPN

Tech Republic Security

Ruoting Sun, of Duo Security, reveals how Duo Beyond makes Google-style BeyondCorp trusted web access available to any enterprise, challenging the traditional approach to security.

VPN 122
article thumbnail

UK debuts new National Cyber Security Centre to take on cybercrime

Tech Republic Security

On Tuesday, the UK's National Cyber Security Centre officially launched, with plans to use the government as 'a guinea pig' for national security measures.

article thumbnail

Video: How HPE's new security-at-the-edge solution will protect and empower more IoT innovation

Tech Republic Security

HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.

IoT 73
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Video: How IBM's new Watson cybersecurity solution can drastically speed up incident response

Tech Republic Security

At RSA 2017, we caught up with IBM's Diana Kelley and learned how Watson's security-expert-as-a-service can enhance the work that CISOs and other security professionals are doing.

CISO 73
article thumbnail

Video: What Verizon's data breach research tells us about the state of IoT security

Tech Republic Security

We interviewed Chris Novak from Verizon's incident response team at RSA 2017 and talked about what the company has learned about securing the Internet of Things.