How to build security into your company's IoT plan
Tech Republic Security
AUGUST 4, 2017
As the IoT market booms, it's essential your company develops long-term cybersecurity solutions. These tips will help you prepare.
Tech Republic Security
AUGUST 4, 2017
As the IoT market booms, it's essential your company develops long-term cybersecurity solutions. These tips will help you prepare.
NopSec
AUGUST 2, 2017
Antivirus software is one of the oldest and the most ever present security control against malware and various types of malicious software. It’s historically focused on blocking viruses, then eventually evolved into blocking all sort of other malware. “I have antivirus so I’m covered” used have some legitimate weight to it. Lately, however, attacks have been growing more sophisticated, specifically trying to stay under the radar using administrator toolkits and evading virus signatures to bypass
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The Falcon's View
AUGUST 2, 2017
Folks: Please stop calling every soup-to-nuts, everything-but-the-kitchen-sink security job a "security architect" role. It's harmful to the industry and it's doing you no favors trying to find the right resources. In fact, please stop posting these "one role does everything security under the sun" positions altogether. It's hurting your recruitment efforts, and it makes it incredibly difficult to find positions that are a good fit.
Spinone
JULY 31, 2017
Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JULY 31, 2017
Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.
Tech Republic Security
AUGUST 2, 2017
Researchers have created an AI that tweaks malware code, and it easily bypassed an anti-malware AI undetected. Is machine learning ready to face down cybersecurity threats?
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
AUGUST 2, 2017
For SMBs, deploying a secure, integrated, and mobile collaborative working environment that doesn't break the bank is nearly impossible. Microsoft 365 is designed to make it not only possible, but easy.
Tech Republic Security
AUGUST 1, 2017
A recent survey of infosec professionals, conducted by Cylance, found that many believe artificial intelligence will soon be used to conduct cyberattacks.
Tech Republic Security
AUGUST 2, 2017
Joel Benavides, Senior Director Global Legal and Advocacy at cloud data host Box, explains how the General Data Protection Regulation will impact cloud-stored data.
Tech Republic Security
AUGUST 1, 2017
Internet users have few options when it comes to online privacy. Tor is one of them, but researchers at Princeton say there are problems. Find out what they are, and how they could be fixed.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
AUGUST 1, 2017
There will soon be 50 billion IoT in the market. Lastwall CEO Karl Holmqvist, and Global Cybersecurity Summit organizer Ryan Brack explain why cybersecurity solutions require long-term planning.
Tech Republic Security
JULY 31, 2017
Britain's Home Secretary Amber Rudd is traveling to Silicon Valley, where she is expected to meet with leaders from firms such as YouTube, to discuss tackling extremist content online.
Tech Republic Security
AUGUST 3, 2017
Mobile phishing is on the rise, and most of it is targeting iOS. It's also moving away from your inbox and into apps, where it's much harder to catch.
Tech Republic Security
AUGUST 4, 2017
Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
AUGUST 3, 2017
Penetration testing company Cymulate can attack your network from multiple vectors, but what really matters is how you use the results to improve your security.
Tech Republic Security
AUGUST 2, 2017
In 2017, Q2 saw a DDoS attack that lasted 277 hours, according to a new report from Kaspersky Lab. Here's how to keep your company safe.
Tech Republic Security
AUGUST 1, 2017
Malware, mobile, and phishing attacks top the list of business security concerns, according to a new report from Webroot.
Tech Republic Security
AUGUST 3, 2017
Coming May 2018, the GDPR will come into effect. Make sure your company knows how to best respond.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
AUGUST 1, 2017
Ukraine is a hotspot for cyberattacks and there's a lot companies can learn from the country's experience in cyberwar.
Tech Republic Security
AUGUST 2, 2017
There is a lot of money to be gained by attacking corporate systems, but not all attackers are motivated by money. To best way to stay secure is to understand what attackers want, say Lastwall CEO Karl Holmqvist and Global Cybersecurity Summit organizer Ryan Brack.
Tech Republic Security
AUGUST 1, 2017
Blockchain4EU will spend this year uncovering uses for blockchains and other Distributed Ledger Technologies beyond their use in cryptocurrencies.
Tech Republic Security
JULY 31, 2017
Want to disappear from the internet? It's not easy, but there are steps you can take to minimize your presence.
Speaker: Sierre Lindgren
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Tech Republic Security
AUGUST 2, 2017
A new bill introduced by the senate would require IoT products used by government entities to meet standards for patchability, password management, and more.
Tech Republic Security
AUGUST 1, 2017
Camera models from Shenzhen Neo Electronics are vulnerable to cyber attacks, according to security firm Bitdefender.
Tech Republic Security
AUGUST 1, 2017
MWR InfoSecurity recently found that a particular physical exploit can be used to install a certain piece of malware to leverage the microphone on Amazon's Alexa-powered home speaker.
Tech Republic Security
JULY 31, 2017
Researchers recently discovered a method of hacking Amazon Echoes in order to capture all the audio it hears and stream it anywhere the attacker wants.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
JULY 31, 2017
Ukraine's power grid, railways, and national election system have all recently been attacked. Karl Holmqvist, CEO of Lastwall and Ryan Brack, Organizer of the Global Cybersecurity Summit explain the lessons every company should learn about cyberwar.
Tech Republic Security
AUGUST 1, 2017
It might not be outside hackers, or even those currently employed, that are your biggest risk. It's more likely someone who was recently fired and has a grudge.
Tech Republic Security
AUGUST 2, 2017
Firefox recently announced a host of new pilot experiments aiming to make the browser simpler, faster, and safer to use, especially in the enterprise.
Tech Republic Security
AUGUST 2, 2017
Some 20% of organizations say they have experienced data breaches by ex-employees. Here's how IT leaders can protect their business.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Let's personalize your content