Sat.Sep 24, 2016 - Fri.Sep 30, 2016

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Security

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

Internet 167
article thumbnail

Apps vs. mobile websites: Which option offers users more privacy?

Tech Republic Security

Is it better to use a mobile app or the equivalent mobile website when it comes to privacy? Researchers have an answer, and offer a privacy resource that rates 50 free online services.

Mobile 167
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

article thumbnail

5 things we learned about the state of cybersecurity from Structure Security 2016

Tech Republic Security

The first annual Structure Security conference took place in San Francisco in September. Here are the top takeaways.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Beware: iOS 10 security flaw makes cracking encrypted backups 2,500 times easier

Tech Republic Security

Russian security firm Elcomsoft discovered the flaw, which makes brute force password cracking far easier than in iOS 9. All iPhone and iPad users need to be aware of what's at stake.

Backups 167
article thumbnail

A Pokemon Go guide infected thousands of phones

Tech Republic Security

"There's no surprise that an app as popular as Pokemon Go has spawned associated malware," said Tim Erlin, senior director of IT security and risk strategy for Tripwire.

Malware 166

LifeWorks

More Trending

article thumbnail

Why operational technology must be addressed to secure industrial IoT

Tech Republic Security

At the 2016 Structure Security conference, GE's Tom Le explained how a combination of IT and OT are core to securing industrial IoT.

IoT 164
article thumbnail

Understanding Android's balance between openness and security

Tech Republic Security

At the 2016 Structure Security conference, Google's Adrian Ludwig talked about the balance between keeping Android as open as possible, while also keeping it secure.

163
163
article thumbnail

How machine learning and AI will 'save the entire security industry'

Tech Republic Security

Machine learning and big data have led to many advances, including some in cybersecurity. Cylance CEO Stuart McClure explained the biggest implications the technology has for security.

Big data 163
article thumbnail

Poll: Should Edward Snowden be pardoned?

Tech Republic Security

Is the NSA hacker a whistleblower or traitor? Hero or villain? Take our poll and tell us whether you think Edward Snowden deserves a break.

162
162
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

What business leaders need to know about the state of cybersecurity

Tech Republic Security

At the 2016 Structure Security conference, Rally Ventures' Art Coviello gave an overview of the threat landscape and provided best practices for security professionals and developers.

article thumbnail

How to enable two-step authentication in Dropbox

Tech Republic Security

Concerned about the security of your Dropbox account? For an added layer of protection, follow this process of setting up two-step authentication in Dropbox.

article thumbnail

Enterprise IoT deployment creates a target-rich environment for criminals

Tech Republic Security

Every company involved in IoT knows the systems are insecure--including Microsoft. It is working on platform solutions, but developers have to make a commitment to proactive security.

IoT 148
article thumbnail

Help wanted: How automation can help with the security skills gap

Tech Republic Security

Many tech jobs are going unfilled, and that number is growing in security. Jay Leek, the CISO of Blackstone, explained how CISOs can prepare for the lack of talent in the future.

CISO 133
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cyberinsurance experts disagree on coverage necessity

Tech Republic Security

Cyberinsurance is an easy pitch. RAND says you might not want to swing.

128
128