Sat.May 07, 2016 - Fri.May 13, 2016

article thumbnail

IBM Watson takes on cybercrime with new cloud-based cybersecurity technology

Tech Republic Security

Eight universities have begun a year-long initiative to train IBM Watson for work in cybersecurity. Will the Jeopardy champ soon police the internet?

article thumbnail

3 Ways to Go Beyond HIPAA Compliance

NopSec

Compliance isn’t enough for healthcare organizations. For years, we have equated compliance with effective vulnerability risk management. This is simply not the case. Recent highly publicized data breaches in major hospitals show that minimum compliance is not effective when protecting your data. In fact, it’s not just major healthcare organizations that get attacked, but virtually all hospitals have been victims of a cyber attack (commonly ransomware) at some point in varying degrees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Businesses beware: the 'industrial internet of things' is a prime target for cyberattacks

Tech Republic Security

Think your Amazon Echo or Samsung Smart TV are IoT security threats? Businesses using the 'industrial internet of things' are even bigger targets for cyberattacks.

Internet 113
article thumbnail

Are you being exploited by online marketers using "tricks for clicks"?

Tech Republic Security

By definition, marketing is all about getting people to do something. Make sure the "doing something" is your decision and not the marketers'.

Marketing 113
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Potential IoT legal challenges should be on your enterprise radar

Tech Republic Security

Lack of existing case law may fuel legal battles in which companies in the IoT market will have the most to lose.

IoT 108
article thumbnail

Android Security Update May 2016: What you need to know

Tech Republic Security

The Android Security Update for May 2016 includes a number of critical issues. Jack Wallen has the highlights, and shows how to find out if your device is up to date.

104
104