Sat.Feb 18, 2017 - Fri.Feb 24, 2017

article thumbnail

I infected my Windows computer with ransomware to test RansomFree's protection

Tech Republic Security

Jesus Vigo went hands-on with RansomFree to see if it could outmaneuver ransomware threats and keep data safe. Here's a look at what he discovered.

article thumbnail

How to add two-factor authentication to your WordPress site

Tech Republic Security

If you employ WordPress for your personal or company sites, you owe it to yourself to set up two-factor authentication. Here's how.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 ways to reduce insider BYOD threats

Tech Republic Security

Employees benefit by using their own devices for work, but there can be security risks as well. Here are some ways to control or reduce these threats.

Risk 155
article thumbnail

5 easily installed utilities for improving your online privacy

Tech Republic Security

You can't go far in the world of tech news without running into a headline about data breaches or hacks. Shore up your defenses by installing these five apps.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to minimize infection from Xagent, the latest malware threat to OS X

Tech Republic Security

Take these steps to protect your Mac from infection by the recently identified Xagent malware.

Malware 153
article thumbnail

Why EU watchdogs say Windows 10 is still a major privacy concern

Tech Republic Security

Microsoft made some attempts to clarify its data collection policies in Windows 10, but some EU watchdogs said that it isn't enough.

LifeWorks

More Trending

article thumbnail

Researchers use hacked hard drive LED to steal data from air-gapped computer

Tech Republic Security

Researchers from Ben Gurion University in Israel discovered a way to covertly steal data from an air-gapped computer by controlling its blinking hard drive light.

Hacking 138
article thumbnail

Android Security Bulletin February 2017: What you need to know

Tech Republic Security

The February 2017 Android Security Bulletin features more critical flaws than any other bulletin to date, as well as a number of high-rated issues. Get the highlights.

114
114
article thumbnail

DevSecOps teams securing cloud-based assets: Why collaboration is key

Tech Republic Security

DevSecOps requires information security, application development, and IT operations teams to collaborate. Find out how these DevSecOps teams can overcome challenges related to cloud security.

article thumbnail

How San Diego is partnering with startups to protect its data

Tech Republic Security

The city of San Diego has partnered with five cyber security startups to work on everything from data governance to building out new infrastructure with next generation firewalls and threat analytics platforms.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Video: How Hytrust's Boundary Control solves the data sovereignty dilemma

Tech Republic Security

We met with Hytrust at RSA 2017 to hear about how the company's Boundary Control product is uniquely tackling the emerging challenges in data sovereignty and data residency.

73
article thumbnail

Video interview: How to make your company resilient to cyber-threats

Tech Republic Security

Cybersecurity challenges can be overwhelming. Cisco's Trust Strategy Officer Anthony Grieco identifies four essential steps to prevent hacking, respond to threats, and build a holistic cybersecurity culture.

article thumbnail

How San Diego is building resilient networks and infrastructure to reduce threat of cyber crime

Tech Republic Security

Gary Hayslip, deputy director of IT and CISO for the city of San Diego, says no city can ever be 100% safe from cyber crime. Here's how San Diego is building multiple layers of overlapping security to protect its data networks to minimize risk.

CISO 65
article thumbnail

Video: How IBM turned Watson into a cybersecurity-expert-as-a-service

Tech Republic Security

We caught up with the general manager of IBM Security, Marc van Zadelhoff, at RSA 2017 and learned IBM learned from oncology to build Watson into a cybersecurity powerhouse.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How Zscaler skips the appliance to deliver cloud security using a cloud service

Tech Republic Security

At RSA 2017, we talked to Zscaler about how it's up to 100 data centers around the world and it's now using them to increase performance while providing cloud-based security.

65
article thumbnail

How Zscaler is optimizing Office 365 to remove the burden from firewalls

Tech Republic Security

We caught up with Zscaler at RSA 2017 and talked about how it's giving Office 365 a 40% performance boost as part of its cloud security service.