Sat.Jan 14, 2017 - Fri.Jan 20, 2017

article thumbnail

80% of IoT apps not tested for vulnerabilities, report says

Tech Republic Security

A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps and 29% of mobile apps are actually tested for vulnerabilities, raising security concerns.

IoT 162
article thumbnail

The Kali Linux Certified Professional

Kali Linux

Introducing the KLCP Certification After almost two years in the making, it is with great pride that we announce today our new Kali Linux Professional certification - the first and only official certification program that validates one’s proficiency with the Kali Linux distribution. If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 9 IT Tools Every Small and Medium Business Needs

Spinone

Managing even the smallest of businesses can be challenging, but luckily there is no shortage of IT applications designed to make things easier in terms of organization, planning, finances, and dealing with customers. Many of the most popular services are cloud-based meaning they are easy to employ (no need to install software on several workstations), and accessible from any device and location.

Backups 40
article thumbnail

NCS Blog: "Minimum Viable" MUST Include Security

The Falcon's View

"If you're a startup trying to get a product off the ground, you've probably been told to build an "MVP" - a minimum viable product - as promoted by the Lean Startup methodology. This translates into products being rapidly developed with the least number of features necessary to make an initial sale or two. Oftentimes, security is not one of the features that makes it into the product, and then it gets quickly forgotten about down the road.".

InfoSec 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

There's a new Gmail phishing attack going around, and it's fooling everyone

Tech Republic Security

Tech professionals don't generally fall for phishing attacks: They know what to look for and when to be suspicious. One new attack, however, is even fooling the experienced.

Phishing 161
article thumbnail

How to enable two-factor authentication for your Apple ID

Tech Republic Security

A hacked Apple account can be worth a lot to a cybercriminal. Protect yourself by enabling two-factor authentication for your Apple ID.

More Trending

article thumbnail

Why email encryption is failing, and how to fix it

Tech Republic Security

Email encryption is a necessity, yet the masses still aren't adopting the technology. Jack Wallen offers a solution to this urgent security problem.

article thumbnail

Report: 57% of businesses can't find enough IT security pros

Tech Republic Security

IT security decision makers say their teams lack the staff and skills needed to combat sophisticated cyberattacks, according to a new report from Osterman Research and Trustwave.

106
106
article thumbnail

Windows 10: Microsoft's enterprise upgrade push 'will pay off in 2017'

Tech Republic Security

Microsoft's offer to upgrade some business customers to Windows 10 for free is the latest in a concerted effort to push firms to begin deployments.

114
114
article thumbnail

How to set up two-factor authentication for your Google account

Tech Republic Security

Two-factor authentication is a simple way to add an extra layer of security to your Google account. Here's how to get it set up.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

If Windows 7's security is so outdated, why doesn't Microsoft make it as good as Windows 10's?

Tech Republic Security

Why can't Microsoft update the 'long-outdated security architectures' it says Windows 7 is based upon?

article thumbnail

Startup Sndr planning encrypted file management for small businesses

Tech Republic Security

There are plenty of enterprise systems for remote file management and data encryption. A startup, Sndr, hopes to bring similar functions to small businesses.

article thumbnail

Poll: Will Trump improve or harm cybersecurity and digital privacy?

Tech Republic Security

The new administration may trigger profound changes in digital security, encryption, personal privacy, and innovation. Do you think the cybersecurity changes will help or hurt business?