Why enterprises are finally paying up for big data security
Tech Republic Security
JULY 5, 2017
Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data.
Tech Republic Security
JULY 5, 2017
Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data.
Lenny Zeltser
JULY 6, 2017
When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
NopSec
JULY 3, 2017
Penetration Testers (aka ethical hackers) use a myriad of hacking tools depending on the nature and scope of the projects they’re working on. Every engagement is different. Are they testing external or internal networks? Perhaps web applications or configurations? Are they given credentials beforehand, including getting their own space in the client’s building?
Tech Republic Security
JULY 7, 2017
Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JULY 6, 2017
Singapore and the US top the list of countries with the greatest commitment to cybersecurity. However, most other countries are lacking in their approach to cybercrime, hacking, and more.
Tech Republic Security
JULY 7, 2017
New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JULY 3, 2017
An Australian researcher has data to suggest cybercriminals are getting better results using phone calls and text messages for their scams than email. Find out why, and get tips for staying safe.
Tech Republic Security
JULY 6, 2017
If you need to get ssh keys copied from client to server but ssh-copy-id isn't an option, you'll have to go the manual route. Here's how to do it.
Tech Republic Security
JULY 5, 2017
A new report from AV-Test showed that ransomware attacks on Windows in 2016 were low. Still, attacks like WannaCry and NotPetya caused a significant amount of damage.
Tech Republic Security
JULY 7, 2017
Greg Michaelidis, Cybersecurity Fellow at the New America Foundation and former Obama Senior Advisor for Public Affairs, explains why America's cybersecurity posture is dangerous and how companies can protect users from cyberattacks.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
JULY 6, 2017
Emily Wilson, director of Analysis at cybersecurity firm Terbium Labs, explains why malware attacks like ransomware have become more prevalent and more potent, and what companies can do to stay secure.
Tech Republic Security
JULY 6, 2017
A new Google G Suite feature called OAuth apps whitelisting aims to improve an organization's visibility into how its data is accessed and used by third-party applications.
Let's personalize your content