Tor: The smart person's guide
Tech Republic Security
OCTOBER 31, 2016
This comprehensive guide covers everything you need to know about Tor, the onion router web browser that allows users to access the Dark Web and other encrypted websites.
Tech Republic Security
OCTOBER 31, 2016
This comprehensive guide covers everything you need to know about Tor, the onion router web browser that allows users to access the Dark Web and other encrypted websites.
CompTIA on Cybersecurity
OCTOBER 31, 2016
What ghastly horrors are lurking behind firewalls and in dark corners behind flickering monitors this Halloween? Read on to face the frighteningly dark realms of cybersecurity and get five steps you can take to protect yourself today – as well as a particularly useful tool for you and your company.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Privacy and Cybersecurity Law
NOVEMBER 4, 2016
Germany to audit 500 companies The German data protection authorities have announced today that they have chosen 500 companies throughout […].
Tech Republic Security
NOVEMBER 1, 2016
Half of employees say that their company does not have rules about using social media at work. Here's what you need to craft a social media policy to protect your data and avoid legal trouble.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
NOVEMBER 3, 2016
The UK's Government Communication Headquarters (GCHQ) are some of the best code breakers in the world. Think you have what it takes to be a cryptanalyst? Find out here.
Tech Republic Security
NOVEMBER 3, 2016
For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
NOVEMBER 4, 2016
OAuth 2.0 allows apps to verify credentials with Facebook or Google logins. One problem: over 41% of apps using OAuth 2.0 aren't actually validating user info, allowing account hijacks.
Tech Republic Security
NOVEMBER 4, 2016
Google recently announced that more than half the pages loaded by Chrome desktop users occurred over an HTTPS connection, and called for increased adoption of the protocol.
Tech Republic Security
NOVEMBER 2, 2016
Security expert rails against the bad advice that everybody follows and the industry's addiction to hyperbole.
Tech Republic Security
NOVEMBER 4, 2016
Insurance companies are starting to fill the loopholes in their cybersecurity products, which could prevent costly lawsuits and angry customers down the road.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Tech Republic Security
OCTOBER 31, 2016
Well-known security researcher Dan Kaminsky suggests how to save the internet by modeling cybersecurity after the NIH.
Let's personalize your content