Sat.Jul 15, 2017 - Fri.Jul 21, 2017

article thumbnail

Worried about ransomware? Here are 3 things IT leaders need to know before the next big outbreak

Tech Republic Security

It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.

article thumbnail

Fighting the War with the Right Weapon: Countering Complexity with Automation

NopSec

Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 3 most in-demand cybersecurity jobs of 2017

Tech Republic Security

Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.

article thumbnail

How blockchain could revolutionize IoT security

Tech Republic Security

There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.

IoT 167
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backups 133
article thumbnail

Massive Amazon S3 breaches highlight blind spots in enterprise race to the cloud

Tech Republic Security

Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.

132
132

More Trending

article thumbnail

These 10 US states have the highest rate of malware infections in the country

Tech Republic Security

A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.

Malware 129
article thumbnail

Devil's Ivy vulnerability could take down millions of servers and IoT devices

Tech Republic Security

A recent blog from Senrio detailed a new flaw called Devil's Ivy, found in an open source code library, that could be used to hijack security cameras and for other nefarious purposes.

IoT 117
article thumbnail

Why cyberattacks should keep CFOs up at night

Tech Republic Security

Hacking incidents cost companies millions of dollars on average. Here's why the CFO needs to be involved in cybersecurity strategies from the start.

Hacking 123
article thumbnail

How to use ssh-agent to make working with secure shell more efficient

Tech Republic Security

If you constantly log in and out of your servers with ssh, Jack Wallen shows you how to make this task a bit more efficient, with the help of ssh-agent.

112
112
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

IBM Z mainframe has built-in encryption to fight 'epidemic of data breaches'

Tech Republic Security

IBM recently unveiled its latest mainframe, IBM Z, with an encryption engine capable of protecting company data in the cloud, in an application, and in a database.

article thumbnail

Top 5: Reasons you need a bug bounty program

Tech Republic Security

Inviting people to find flaws in your system might sound crazy. But who would you rather discover a bug: someone working for you, or against you?

110
110
article thumbnail

IBM, London Stock Exchange build blockchain tool to manage shareholder data

Tech Republic Security

IBM has partnered with Borsa Italiana, part of London Stock Exchange Group, in an effort to digitize securities certificate data for smaller companies.

104
104
article thumbnail

The secret to Google's rock-solid security is now commercially available

Tech Republic Security

A new startup aims to commercialize a security approach birthed at Google. It just might work.

129
129
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How to use Group Policy to resolve Active Directory account lockouts

Tech Republic Security

Determining the source of locked accounts can be difficult and time-consuming. Use this technique to help troubleshoot this problem.

article thumbnail

Video: How AI-based pen testing can fend off the next big cyber-attack

Tech Republic Security

As attack vectors evolve, so too do hacker tactics. Mike Cotton, VP of Research and Development at Digital Defense, explains how automation helps companies prepare for the next attack.

article thumbnail

Video: Expect bigger and more complex DDoS attacks

Tech Republic Security

Nexusguard's CTO Juniman Kasman explains how the hybrid cloud helps cybersecurity firms differentiate between legitimate traffic and fake IP addresses used for denial of service attacks.

DDOS 75
article thumbnail

Video: Why encryption back doors are a bad idea

Tech Republic Security

Encryption safeguards your company's most sensitive data. Access Now's U.S. Policy Manager Amie Stepanovich explains why a proposal by the Australian Prime Minister threatens the safety of data around the world.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Video: How to operationalize threat intelligence

Tech Republic Security

Travis Farral, Director of Security Strategy at Anomali, explains why ransomware attacks occur, how they spread, and what organizations can do to keep data secure.

article thumbnail

5 reasons to start a bug bounty program

Tech Republic Security

Why invite people to look into your code and try to find flaws? Here are five good reasons.

73
article thumbnail

CIS 20 Controls: Utilizing CIS 20 Critical Controls for Vulnerability Prioritization

NopSec

CIS 20 Security Controls represent one of the reference frameworks of the most critical controls an organization can implement to establish a well balanced security program to safeguard confidentiality, integrity and availability of information. It provides a detailed guide for prioritization, implementation and customization of your security controls as well as sequence, test, and achieve continuous automation.