Sat.Jan 07, 2017 - Fri.Jan 13, 2017

article thumbnail

49% of businesses fell victim to cyber ransom attacks in 2016

Tech Republic Security

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know.

article thumbnail

2017 Outlook: Remediation Trends

NopSec

Each year, NopSec conducts a survey of IT and cybersecurity professionals to glean a snapshot of the current state of vulnerability risk management and the outlook for VRM(Vulnerability Risk Management) in the coming year. This survey lets us take the pulse of security professionals across different types of businesses and at varying levels in their organizations, and provides some benchmarking figures for infosec teams who want to know how the maturity of their VRM programs compare.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Drive Backup Software

Spinone

Today, many people use Google Drive to store personal and working documents. Google Drive Backup and Recovery software is the best solution for keeping your data safe. Google Drive Advantages All of your documents are always available, no matter where or when a great idea has visited you. Whether you are at work, home or on the go, you can write new or edit existing documents and share them with colleagues.

Backups 40
article thumbnail

Get ready for the rise of spymail, the hottest trend in email hacking

Tech Republic Security

A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.

Hacking 157
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Why the age of connected cars presents a 'very real threat' in cybersecurity

Tech Republic Security

At NAIAS 2017, experts in data management and cybersecurity discussed the risks that come with the 'internet of cars.' Here's what you should know.

article thumbnail

Massive ransomware attack takes out 27,000 MongoDB servers

Tech Republic Security

A slew of MongoDB databases were recently wiped, with attackers demanding Bitcoin payment in exchange for the data, as tracked by Norwegian developer Niall Merrigan and ethical hacker Victor Gevers.

LifeWorks

More Trending

article thumbnail

Amazon Echo murder case raises IoT privacy questions for enterprise users

Tech Republic Security

Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things.

IoT 150
article thumbnail

The downside to the developer revolution: Big data (in)security

Tech Republic Security

Developers just want to 'get stuff done,' but may be putting their enterprise data at risk in the process. Here's why.

Big data 147
article thumbnail

Poll: Do you use a password manager?

Tech Republic Security

Password managers are convenient, affordable, and essential to secure your accounts. How do you lock down your sensitive business and personal data?

article thumbnail

5 data security and privacy tips for iOS

Tech Republic Security

Securing privacy and data on mobile devices is always a tricky proposition, but with the right combination of settings, apps, and care, iOS users can feel safer.

Mobile 144
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Windows 10 snooping: Microsoft will harvest less data but still awaits nod from watchdog

Tech Republic Security

Microsoft dials back data collection in its flagship OS but one privacy watchdog is still assessing whether the changes go far enough.

article thumbnail

The weaponized personal network of things could be on your doorstep before you know it

Tech Republic Security

Driven by gigabit ethernet, the Personal Internet of Things is breaking open new markets but might also allow hackers into your home. Cybersecurity experts explain how you might be vulnerable.

Marketing 138
article thumbnail

IBM Watson, FDA to use blockchain tech to build secure exchange for health data

Tech Republic Security

IBM Watson Health and the FDA recently signed a research initiative looking at ways to leverage the blockchain to safely share sensitive health data, starting with oncology records.

138
138
article thumbnail

Google Cloud ups encryption efforts with new key management service

Tech Republic Security

Google recently unveiled its Cloud Key Management Service in beta, which aims to be a scalable solution for management and auditing of encryption keys.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Hackers steal 900 GB of data from phone hacking company Cellebrite

Tech Republic Security

Hackers have taken records of customer information and technical resources from Cellebrite, an organization which sells hardware designed to extract data from secured smartphones.

Hacking 133
article thumbnail

Video: Top 5 HTTPS best practices

Tech Republic Security

Browsers and search engines are starting to expect HTTPS connections. Here are some tips for ensuring that your site is compatible, safe and secure.

article thumbnail

Gallery: The top zero day Dark Web markets

Tech Republic Security

Cyberweapons, personal data, and corporate secrets are all available on the Dark Web. But where and how is stolen data bought and sold? Our expert hacker lists some of the top illicit online markets.

Marketing 128
article thumbnail

4 Windows Hello devices that will change the way you log into your PC

Tech Republic Security

Windows Hello is now found on almost 100 biometric-enabled devices. Here are some of the most interesting options for using the platform.

122
122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Windows 10: Microsoft stops short of letting all users defer buggy updates

Tech Republic Security

A forthcoming feature that lets users pause updates to Windows 10 for up to 35 days won't be universally available.

103
103
article thumbnail

Video: How BlackBerry QNX is going to make autonomous vehicles highly secure

Tech Republic Security

BlackBerry's QNX team is preparing to make connected cars and autonomous vehicles highly secure by using virtualization and advanced software. We caught up with the team at CES 2017.

article thumbnail

CES 2017: How BlackBerry plans to solve the IoT security threat

Tech Republic Security

The Internet of Things is arguably the biggest trend of CES 2017, but it's also a massive security risk. BlackBerry's Chief Security Officer explains how it can mitigate the IoT cybersecurity threat.

IoT 65
article thumbnail

Ransomware: Global Damage

Spinone

Today, we are going to explore the damage that Ransomware brings and guide you how to ensure effective Ransomware protection. The Cyber Threat Alliance (CTA) conducted an in-depth study about the virus CryptoWall version 3 (CW3). So, we are sharing their analysis and publishing excerpts of the CryptoWall report: Ransomware is a type of malware that encrypts a victim’s files and subsequently demands payment in return for the key that can decrypt the said files.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Build an effective cyberattack recovery playbook by following this NIST guide

Tech Republic Security

Cybersecurity prevention efforts should not trump response capabilities. Experts at NIST spell out four steps to recovering from a cyberattack.

article thumbnail

Trump taps Rudy Giuliani to help with cybersecurity efforts

Tech Republic Security

US President-elect Donald Trump will look to former New York City mayor Rudy Giuliani to share insight and expertise on private sector cybersecurity issues.