Sat.Feb 18, 2017 - Fri.Feb 24, 2017

article thumbnail

I infected my Windows computer with ransomware to test RansomFree's protection

Tech Republic Security

Jesus Vigo went hands-on with RansomFree to see if it could outmaneuver ransomware threats and keep data safe. Here's a look at what he discovered.

article thumbnail

10 ways to reduce insider BYOD threats

Tech Republic Security

Employees benefit by using their own devices for work, but there can be security risks as well. Here are some ways to control or reduce these threats.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 easily installed utilities for improving your online privacy

Tech Republic Security

You can't go far in the world of tech news without running into a headline about data breaches or hacks. Shore up your defenses by installing these five apps.

article thumbnail

How to add two-factor authentication to your WordPress site

Tech Republic Security

If you employ WordPress for your personal or company sites, you owe it to yourself to set up two-factor authentication. Here's how.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Android ransomware up more than 50%, locking users' devices until they pay

Tech Republic Security

A recent report stated that, over the past year, Android ransomware detections rose more than 50%, with many attacks occurring in the first half of 2016.

article thumbnail

Why EU watchdogs say Windows 10 is still a major privacy concern

Tech Republic Security

Microsoft made some attempts to clarify its data collection policies in Windows 10, but some EU watchdogs said that it isn't enough.

More Trending

article thumbnail

How to minimize infection from Xagent, the latest malware threat to OS X

Tech Republic Security

Take these steps to protect your Mac from infection by the recently identified Xagent malware.

Malware 141
article thumbnail

DevSecOps teams securing cloud-based assets: Why collaboration is key

Tech Republic Security

DevSecOps requires information security, application development, and IT operations teams to collaborate. Find out how these DevSecOps teams can overcome challenges related to cloud security.

article thumbnail

Video: How Hytrust's Boundary Control solves the data sovereignty dilemma

Tech Republic Security

We met with Hytrust at RSA 2017 to hear about how the company's Boundary Control product is uniquely tackling the emerging challenges in data sovereignty and data residency.

63
article thumbnail

How San Diego is partnering with startups to protect its data

Tech Republic Security

The city of San Diego has partnered with five cyber security startups to work on everything from data governance to building out new infrastructure with next generation firewalls and threat analytics platforms.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Video interview: How to make your company resilient to cyber-threats

Tech Republic Security

Cybersecurity challenges can be overwhelming. Cisco's Trust Strategy Officer Anthony Grieco identifies four essential steps to prevent hacking, respond to threats, and build a holistic cybersecurity culture.

article thumbnail

How San Diego is building resilient networks and infrastructure to reduce threat of cyber crime

Tech Republic Security

Gary Hayslip, deputy director of IT and CISO for the city of San Diego, says no city can ever be 100% safe from cyber crime. Here's how San Diego is building multiple layers of overlapping security to protect its data networks to minimize risk.

CISO 60
article thumbnail

How Zscaler skips the appliance to deliver cloud security using a cloud service

Tech Republic Security

At RSA 2017, we talked to Zscaler about how it's up to 100 data centers around the world and it's now using them to increase performance while providing cloud-based security.

60
article thumbnail

Video: How IBM turned Watson into a cybersecurity-expert-as-a-service

Tech Republic Security

We caught up with the general manager of IBM Security, Marc van Zadelhoff, at RSA 2017 and learned IBM learned from oncology to build Watson into a cybersecurity powerhouse.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How Zscaler is optimizing Office 365 to remove the burden from firewalls

Tech Republic Security

We caught up with Zscaler at RSA 2017 and talked about how it's giving Office 365 a 40% performance boost as part of its cloud security service.

article thumbnail

Researchers use hacked hard drive LED to steal data from air-gapped computer

Tech Republic Security

Researchers from Ben Gurion University in Israel discovered a way to covertly steal data from an air-gapped computer by controlling its blinking hard drive light.

Hacking 124