Sat.Nov 26, 2016 - Fri.Dec 02, 2016

article thumbnail

What new cybersecurity trends will dominate 2017?

Tech Republic Security

In 2016 ransomware, phishing, and IoT attacks pummeled business and consumers alike. What cybersecurity trends will emerge in 2017? Take our survey to share your opinion about emerging hacker trends.

article thumbnail

Incentives, Insurance and Root Cause

Adam Shostack

Over the decade or so since The New School book came out, there’s been a sea change in how we talk about breaches, and how we talk about those who got breached. We agree that understanding what’s going wrong should be a bigger part of how we learn. I’m pleased to have played some part in that movement. As I consider where we are today, a question that we can’t answer sufficiently is “what’s in it for me?

Insurance 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux in the AWS cloud, again

Kali Linux

We’re happy to announce that we’ve once again listed our Kali Linux images on the Amazon AWS marketplace. You can now spin up an updated Kali machine easily through your EC2 panel. Our current image is a “full” image, which contains all the standard tools available in a full Kali release. Once your instance is running, connect to it with your SSH private key using the “ ec2-user ” account.

article thumbnail

Nikto v2.5 releases – WebAPP Penetration Testing Tool

Penetration Testing

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and... The post Nikto v2.5 releases – WebAPP Penetration Testing Tool appeared first on Penetration Testing.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Five essential cybersecurity audiobooks

Tech Republic Security

A curated list of cybersecurity audiobooks to help you better understand the history of computing, who hacks and why, and the future of cyber-defense.

article thumbnail

Threat Modeling the PASTA Way

Adam Shostack

There’s a really interesting podcast with Robert Hurlbut Chris Romeo and Tony UcedaVelez on the PASTA approach to threat modeling. The whole podcast is interesting, especially hearing Chris and Tony discuss how an organization went from STRIDE to CAPEC and back again. There’s a section where they discuss the idea of “think like an attacker,” and Chris brings up some of what I’ve written (“ ‘Think Like an Attacker’ is an opt-in mistake.”) I th

Risk 100

LifeWorks

More Trending

article thumbnail

Infographic: Small business is vulnerable to cyberattack

Tech Republic Security

According to a survey by data firm Carbonite 74% of small business owners fear Washington politicians are not doing enough to protect companies against cyberattack.

article thumbnail

The state of malware: 4 big takeaways from AV-TEST's 2016 report

Tech Republic Security

The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe.

Malware 167
article thumbnail

How to add more entropy to improve cryptographic randomness on Linux

Tech Republic Security

If you have Linux servers that depend upon encryption, you owe it to yourself to beef up the system entropy. Here's how to do so with haveged.

article thumbnail

Android Security Bulletin November 2016: What you need to know

Tech Republic Security

The Android Mediaserver is back in the critical column for vulnerabilities. Get the highlights of the November 2016 bulletin.

167
167
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to use PowerShell to investigate Windows Defender's malware signature definitions database

Tech Republic Security

What malware does Windows Defender recognize? Learn how to use PowerShell's Defender cmdlets to peek inside the malware signature definitions database.

Malware 167
article thumbnail

Eye scanners and fingerprints in cars will double by 2021, report says

Tech Republic Security

The market for biometric vehicle access systems is expected to reach $855 million by 2021. Here's what the rise of biometrics could mean for your car and your enterprise.

Marketing 167
article thumbnail

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG.

Firewall 166
article thumbnail

How Harvard University secures its cloud network with Amazon

Tech Republic Security

Recently, at the AWS re:Invent conference, Harvard's manager of cloud architecture detailed the main investments that the university made in order to secure its cloud.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Privacy advocates rejoice: A new way to anonymize data might actually work

Tech Republic Security

Researchers at Radboud University have developed an anonymization process using polymorphic encryption and pseudonymisation. Applications may include securing healthcare and IoT data.

IoT 159
article thumbnail

iCalendar users: Noticing spam invitations? Here's what's happening and how to fix it

Tech Republic Security

The problem is unique to iCalendar users and it stems from Apple's desire to make things easier for us. Luckily there is a way to get rid of those random, often unintelligible, invites.

113
113
article thumbnail

Gavle Lessons: 56% Is Not Sufficiently More Secure!

Adam Shostack

In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat. Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends. The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.

article thumbnail

Electoral Chaos

Adam Shostack

[ Dec 15 : Note that there are 4 updates to the post with additional links after writing.]. The Green Party is driving a set of recounts that might change the outcome in one or more swing states. Simultaneously, there is a growing movement to ask the Electoral College to choose a candidate other than Donald Trump to be the next President of the United States.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity in President Trump's America: The first 100 days

Tech Republic Security

It could take months to know what the Trump administration's cybersecurity policy will be. Cyber-defense experts weigh in with advice and best practices for securing your company today.