Sat.Feb 11, 2017 - Fri.Feb 17, 2017

article thumbnail

Big data privacy is a bigger issue than you think

Tech Republic Security

When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.

Big data 167
article thumbnail

Phishing: What Everyone in Your Organization Needs to Know

NopSec

Do you feel confident that everyone in your organization could identify a phishing email that contained ransomware? What if the recipient is in a hurry and under a lot of stress – will they be aware of how sophisticated and authentic-looking a well-crafted whaling attack can be? In today’s post, we share information with the goal that it will help everyone in your organization protect themselves from phishing attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IBM uses Watson to fill cybersecurity gaps

Tech Republic Security

IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.

article thumbnail

4 tips to help your business recruit, and keep, cybersecurity pros

Tech Republic Security

According to a new report from ISACA, 27% of US companies are unable to fill cybersecurity positions, and most applicants aren't qualified for the job. Here's how to better recruit cyber professionals.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Free charging stations can hack your phone, here's how to protect yourself

Tech Republic Security

A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.

Hacking 156
article thumbnail

Think Apple computers are still malware immune? This new attack proves otherwise

Tech Republic Security

A newly detected malware targeting macOS devices can steal passwords and capture iPhone backups. And it's coming from the same group believed to be responsible for the 2016 election hacks.

Malware 139

More Trending

article thumbnail

How to make Apache more secure by hiding directory folders

Tech Republic Security

If you serve up your websites with Apache, you might want to prevent the server from listing subdirectories. Here are two simple tricks for securing your Apache server.

129
129
article thumbnail

Report: Data breaches growing more complex, causing more damage

Tech Republic Security

Verizon's latest Data Breach Digest report claims that data breaches are affecting more parts of organizations and becoming more sophisticated. Here's how you can respond.

article thumbnail

RSA Conference: New ransomware could poison your town's water supply if you don't pay up

Tech Republic Security

Researchers at Georgia Tech have created a new form of ransomware specifically to target industrial systems, that disrupted a simulated water treatment plant.

article thumbnail

UK debuts new National Cyber Security Centre to take on cybercrime

Tech Republic Security

On Tuesday, the UK's National Cyber Security Centre officially launched, with plans to use the government as 'a guinea pig' for national security measures.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Duo Beyond wants to remove the network perimeter and get rid of the VPN

Tech Republic Security

Ruoting Sun, of Duo Security, reveals how Duo Beyond makes Google-style BeyondCorp trusted web access available to any enterprise, challenging the traditional approach to security.

VPN 101
article thumbnail

RSA Conference: HPE looks to boost enterprise IoT security with Apache NiFi

Tech Republic Security

HPE's SecureData for Hadoop and IoT, unveiled at RSA, aims to protect sensitive IoT data at rest, in transit, and in use.

IoT 123
article thumbnail

Personal vs. corporate email: The security threats differ, says Google

Tech Republic Security

Hackers differ their approach based on who they're attacking. Here's what that means for your unique situation.

114
114
article thumbnail

Video: How IBM's new Watson cybersecurity solution can drastically speed up incident response

Tech Republic Security

At RSA 2017, we caught up with IBM's Diana Kelley and learned how Watson's security-expert-as-a-service can enhance the work that CISOs and other security professionals are doing.

CISO 63
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Video: How HPE's new security-at-the-edge solution will protect and empower more IoT innovation

Tech Republic Security

HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.

IoT 63
article thumbnail

Video: What Verizon's data breach research tells us about the state of IoT security

Tech Republic Security

We interviewed Chris Novak from Verizon's incident response team at RSA 2017 and talked about what the company has learned about securing the Internet of Things.