Sat.Apr 16, 2016 - Fri.Apr 22, 2016

article thumbnail

Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

Tech Republic Security

Forensic experts indicate cyber threat hunting is an improvement over what currently exists for detecting security threats. Find out what makes cyber threat hunting unique.

article thumbnail

Improving Business Outcomes With VRM

NopSec

Time and again, we hear from information security leaders who have invested in vulnerability risk management (VRM) technology and are now asking themselves whether the time, money, and resources put into VRM implementation are delivering on the promised value. In our opinion, they can and they must, but that requires aligning your business needs with the right technology.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to use Signal for encrypted SMS messages

Tech Republic Security

Jack Wallen shows you how to get up and running with the encrypted SMS app Signal.

article thumbnail

How to connect your Android device to a VPN with VyprVPN

Tech Republic Security

If you aren't a fan of using unsecured wireless networks while on the go, a VPN client is what you want. Jack Wallen introduces you to one of the best on the Android platform.

VPN 64
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.