Sat.May 07, 2016 - Fri.May 13, 2016

article thumbnail

IBM Watson takes on cybercrime with new cloud-based cybersecurity technology

Tech Republic Security

Eight universities have begun a year-long initiative to train IBM Watson for work in cybersecurity. Will the Jeopardy champ soon police the internet?

article thumbnail

3 Ways to Go Beyond HIPAA Compliance

NopSec

Compliance isn’t enough for healthcare organizations. For years, we have equated compliance with effective vulnerability risk management. This is simply not the case. Recent highly publicized data breaches in major hospitals show that minimum compliance is not effective when protecting your data. In fact, it’s not just major healthcare organizations that get attacked, but virtually all hospitals have been victims of a cyber attack (commonly ransomware) at some point in varying degrees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Businesses beware: the 'industrial internet of things' is a prime target for cyberattacks

Tech Republic Security

Think your Amazon Echo or Samsung Smart TV are IoT security threats? Businesses using the 'industrial internet of things' are even bigger targets for cyberattacks.

Internet 104
article thumbnail

Are you being exploited by online marketers using "tricks for clicks"?

Tech Republic Security

By definition, marketing is all about getting people to do something. Make sure the "doing something" is your decision and not the marketers'.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Android Security Update May 2016: What you need to know

Tech Republic Security

The Android Security Update for May 2016 includes a number of critical issues. Jack Wallen has the highlights, and shows how to find out if your device is up to date.

70
article thumbnail

Potential IoT legal challenges should be on your enterprise radar

Tech Republic Security

Lack of existing case law may fuel legal battles in which companies in the IoT market will have the most to lose.

IoT 74