Sat.Aug 27, 2016 - Fri.Sep 02, 2016

article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

CASL compliance undertakings continue to mount

Privacy and Cybersecurity Law

Another company that is well-known to consumers has agreed to enter into a compliance undertaking with the CRTC for alleged […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux 2016.2 Release

Kali Linux

We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re launching our second Kali Rolling ISO release aka Kali 2016.2. This release brings a whole bunch of interesting news and updates into the world of Kali and we’re excited to tell you all about it. New KDE, MATE, LXDE, e17, and Xfce Builds Although users are able to build and customize their Kali Linux ISOs however they wish, we often hear people comment about how they would love to see K

article thumbnail

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

2012 Dropbox hack worse than realized, 68M passwords leaked

Tech Republic Security

According to a recent report, a 2012 hack on cloud file sharing company DropBox put millions of users at risk. It also highlights the importance of good security hygiene for every employee.

Hacking 122
article thumbnail

The five military OPSEC steps that businesses can learn from

Tech Republic Security

The most well-trained military in the world will be completely ineffective if operational info is leaked. Find out what the military does to stay secure and how it can be applied to business.

114
114

LifeWorks

More Trending

article thumbnail

How to enable two-factor authentication on Nextcloud 10

Tech Republic Security

If you're running a Nextcloud 10 server and worrying about security, follow these steps to set up two-factor authentication and add an extra layer of protection for your users' data.

article thumbnail

How to force users to create secure passwords on Linux

Tech Republic Security

Strong passwords are a must. But if your servers and desktops don't require strong passwords, you can't enforce such a policy. Here's a step-by-step buide to enabling strong passwords on your Ubuntu machines with the help of PAM.

Passwords 111
article thumbnail

Self-checking chips could eliminate hardware security issues

Tech Republic Security

Researchers may have found a way to validate chips, so all concerned parties are satisfied the silicon is backdoor-free.

99
article thumbnail

The Ashley Madison Breach: Canada-Australia Report of Investigation and Takeaways for all Organizations

Privacy and Cybersecurity Law

On August 23, 2016, the Office of the Privacy Commissioner of Canada (OPC) released its joint report with the Office […].

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.