How blockchain could revolutionize IoT security
Tech Republic Security
JULY 17, 2017
There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.
Tech Republic Security
JULY 17, 2017
There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.
NopSec
JULY 19, 2017
Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
JULY 21, 2017
It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.
Tech Republic Security
JULY 17, 2017
Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JULY 18, 2017
Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.
Tech Republic Security
JULY 19, 2017
Hacking incidents cost companies millions of dollars on average. Here's why the CFO needs to be involved in cybersecurity strategies from the start.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JULY 20, 2017
Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.
Tech Republic Security
JULY 19, 2017
A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.
Tech Republic Security
JULY 19, 2017
A new startup aims to commercialize a security approach birthed at Google. It just might work.
Tech Republic Security
JULY 20, 2017
A recent blog from Senrio detailed a new flaw called Devil's Ivy, found in an open source code library, that could be used to hijack security cameras and for other nefarious purposes.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
JULY 20, 2017
If you constantly log in and out of your servers with ssh, Jack Wallen shows you how to make this task a bit more efficient, with the help of ssh-agent.
Tech Republic Security
JULY 19, 2017
Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware.
Tech Republic Security
JULY 20, 2017
IBM has partnered with Borsa Italiana, part of London Stock Exchange Group, in an effort to digitize securities certificate data for smaller companies.
Tech Republic Security
JULY 17, 2017
IBM recently unveiled its latest mainframe, IBM Z, with an encryption engine capable of protecting company data in the cloud, in an application, and in a database.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
JULY 21, 2017
Nexusguard's CTO Juniman Kasman explains how the hybrid cloud helps cybersecurity firms differentiate between legitimate traffic and fake IP addresses used for denial of service attacks.
Tech Republic Security
JULY 20, 2017
Determining the source of locked accounts can be difficult and time-consuming. Use this technique to help troubleshoot this problem.
Tech Republic Security
JULY 20, 2017
As attack vectors evolve, so too do hacker tactics. Mike Cotton, VP of Research and Development at Digital Defense, explains how automation helps companies prepare for the next attack.
Tech Republic Security
JULY 18, 2017
Why invite people to look into your code and try to find flaws? Here are five good reasons.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
JULY 17, 2017
Encryption safeguards your company's most sensitive data. Access Now's U.S. Policy Manager Amie Stepanovich explains why a proposal by the Australian Prime Minister threatens the safety of data around the world.
Tech Republic Security
JULY 18, 2017
Travis Farral, Director of Security Strategy at Anomali, explains why ransomware attacks occur, how they spread, and what organizations can do to keep data secure.
NopSec
JULY 18, 2017
CIS 20 Security Controls represent one of the reference frameworks of the most critical controls an organization can implement to establish a well balanced security program to safeguard confidentiality, integrity and availability of information. It provides a detailed guide for prioritization, implementation and customization of your security controls as well as sequence, test, and achieve continuous automation.
Let's personalize your content