How to easily encrypt/decrypt a file in Linux with gpg
Tech Republic Security
MAY 4, 2016
Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.
Tech Republic Security
MAY 4, 2016
Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.
NopSec
MAY 2, 2016
Most small and medium business owners believe that cyber criminals only target large businesses and corporations. They couldn’t be more wrong. In 2015, 62% of all data breaches were against SMBs according to IBM and the Ponemon Institute. Considering that a majority of business entities in the United States are small and medium businesses, and most of them do not have robust information security programs in place, there is definitely an incentive in targeting SMBs instead.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
MAY 6, 2016
The Computer Science Teachers Association (CTSA) is working on a cybersecurity certification program for computer science educators, so they can better teach students about computer security.
Tech Republic Security
MAY 5, 2016
The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
MAY 5, 2016
Developers would often rather write apps than secure them, but public cloud providers can help them do both.
Tech Republic Security
MAY 3, 2016
The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.
Let's personalize your content