How to quickly audit a Linux system from the command line
Tech Republic Security
NOVEMBER 3, 2016
For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.
Tech Republic Security
NOVEMBER 3, 2016
For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.
CompTIA on Cybersecurity
OCTOBER 31, 2016
What ghastly horrors are lurking behind firewalls and in dark corners behind flickering monitors this Halloween? Read on to face the frighteningly dark realms of cybersecurity and get five steps you can take to protect yourself today – as well as a particularly useful tool for you and your company.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Privacy and Cybersecurity Law
NOVEMBER 4, 2016
Germany to audit 500 companies The German data protection authorities have announced today that they have chosen 500 companies throughout […].
Tech Republic Security
NOVEMBER 2, 2016
Security expert rails against the bad advice that everybody follows and the industry's addiction to hyperbole.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
NOVEMBER 3, 2016
Security researcher Kevin Beaumont recently discovered a botnet attack that almost took down all internet service in Liberia. Here's what you need to know.
Tech Republic Security
NOVEMBER 1, 2016
Half of employees say that their company does not have rules about using social media at work. Here's what you need to craft a social media policy to protect your data and avoid legal trouble.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
OCTOBER 31, 2016
Well-known security researcher Dan Kaminsky suggests how to save the internet by modeling cybersecurity after the NIH.
Tech Republic Security
NOVEMBER 4, 2016
OAuth 2.0 allows apps to verify credentials with Facebook or Google logins. One problem: over 41% of apps using OAuth 2.0 aren't actually validating user info, allowing account hijacks.
Tech Republic Security
NOVEMBER 3, 2016
The UK's Government Communication Headquarters (GCHQ) are some of the best code breakers in the world. Think you have what it takes to be a cryptanalyst? Find out here.
Tech Republic Security
NOVEMBER 4, 2016
Google recently announced that more than half the pages loaded by Chrome desktop users occurred over an HTTPS connection, and called for increased adoption of the protocol.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
NOVEMBER 4, 2016
Insurance companies are starting to fill the loopholes in their cybersecurity products, which could prevent costly lawsuits and angry customers down the road.
Let's personalize your content