Sat.May 21, 2016 - Fri.May 27, 2016

article thumbnail

11+ security questions to consider during an IT risk assessment

Tech Republic Security

IT risk assessments are crucial to minimize the fallout from cyberattacks. Experts explain why and suggest what questions to consider to assess your company's risk.

Risk 101
article thumbnail

Office of the Privacy Commissioner announces first investigation under the address harvesting provisions

Privacy and Cybersecurity Law

Today, the Office of the Privacy Commissioner (OPC) announced its report of findings against Compu-Finder, a Quebec-based company that offers […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 52
article thumbnail

5 ways to secure OS X

Tech Republic Security

With OS X security exploits on the rise, Jesus Vigo takes a look at 5 ways to better protect your Mac from malware infections and data loss.

Malware 110
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CompTIA report: Almost half of companies believe their security is 'good enough'

Tech Republic Security

A recent security report from CompTIA found that while threats are growing stronger, many enterprises still aren't ready to face them.

107
107
article thumbnail

5 more ways to secure OS X

Tech Republic Security

Apple devices aren't impervious to threats against your data. Here are 5 more methods for keeping your information safe.

99

More Trending

article thumbnail

LIVE STREAMING SECURITY GAMES

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40
article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40