Sat.Apr 16, 2016 - Fri.Apr 22, 2016

article thumbnail

How to use Signal for encrypted SMS messages

Tech Republic Security

Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.

article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. In our opinion, they can and they must, but that requires aligning your business needs with the right technology.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

article thumbnail

How to connect your Android device to a VPN with VyprVPN

Tech Republic Security

If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.

VPN 84
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.