Sat.Jul 15, 2017 - Fri.Jul 21, 2017

article thumbnail

How blockchain could revolutionize IoT security

Tech Republic Security

There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.

IoT 167
article thumbnail

Fighting the War with the Right Weapon: Countering Complexity with Automation

NopSec

Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Worried about ransomware? Here are 3 things IT leaders need to know before the next big outbreak

Tech Republic Security

It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.

article thumbnail

The 3 most in-demand cybersecurity jobs of 2017

Tech Republic Security

Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Massive Amazon S3 breaches highlight blind spots in enterprise race to the cloud

Tech Republic Security

Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.

148
148
article thumbnail

Why cyberattacks should keep CFOs up at night

Tech Republic Security

Hacking incidents cost companies millions of dollars on average. Here's why the CFO needs to be involved in cybersecurity strategies from the start.

Hacking 146

LifeWorks

More Trending

article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backups 144
article thumbnail

These 10 US states have the highest rate of malware infections in the country

Tech Republic Security

A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.

Malware 144
article thumbnail

The secret to Google's rock-solid security is now commercially available

Tech Republic Security

A new startup aims to commercialize a security approach birthed at Google. It just might work.

144
144
article thumbnail

Devil's Ivy vulnerability could take down millions of servers and IoT devices

Tech Republic Security

A recent blog from Senrio detailed a new flaw called Devil's Ivy, found in an open source code library, that could be used to hijack security cameras and for other nefarious purposes.

IoT 134
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to use ssh-agent to make working with secure shell more efficient

Tech Republic Security

If you constantly log in and out of your servers with ssh, Jack Wallen shows you how to make this task a bit more efficient, with the help of ssh-agent.

134
134
article thumbnail

Video: How an IoT firewall can protect your smart office from cyber-attacks

Tech Republic Security

Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware.

Firewall 134
article thumbnail

IBM, London Stock Exchange build blockchain tool to manage shareholder data

Tech Republic Security

IBM has partnered with Borsa Italiana, part of London Stock Exchange Group, in an effort to digitize securities certificate data for smaller companies.

129
129
article thumbnail

IBM Z mainframe has built-in encryption to fight 'epidemic of data breaches'

Tech Republic Security

IBM recently unveiled its latest mainframe, IBM Z, with an encryption engine capable of protecting company data in the cloud, in an application, and in a database.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Video: Expect bigger and more complex DDoS attacks

Tech Republic Security

Nexusguard's CTO Juniman Kasman explains how the hybrid cloud helps cybersecurity firms differentiate between legitimate traffic and fake IP addresses used for denial of service attacks.

DDOS 114
article thumbnail

How to use Group Policy to resolve Active Directory account lockouts

Tech Republic Security

Determining the source of locked accounts can be difficult and time-consuming. Use this technique to help troubleshoot this problem.

article thumbnail

Video: How AI-based pen testing can fend off the next big cyber-attack

Tech Republic Security

As attack vectors evolve, so too do hacker tactics. Mike Cotton, VP of Research and Development at Digital Defense, explains how automation helps companies prepare for the next attack.

article thumbnail

5 reasons to start a bug bounty program

Tech Republic Security

Why invite people to look into your code and try to find flaws? Here are five good reasons.

84
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Video: Why encryption back doors are a bad idea

Tech Republic Security

Encryption safeguards your company's most sensitive data. Access Now's U.S. Policy Manager Amie Stepanovich explains why a proposal by the Australian Prime Minister threatens the safety of data around the world.

article thumbnail

Video: How to operationalize threat intelligence

Tech Republic Security

Travis Farral, Director of Security Strategy at Anomali, explains why ransomware attacks occur, how they spread, and what organizations can do to keep data secure.

article thumbnail

CIS 20 Controls: Utilizing CIS 20 Critical Controls for Vulnerability Prioritization

NopSec

CIS 20 Security Controls represent one of the reference frameworks of the most critical controls an organization can implement to establish a well balanced security program to safeguard confidentiality, integrity and availability of information. It provides a detailed guide for prioritization, implementation and customization of your security controls as well as sequence, test, and achieve continuous automation.