Sat.Jul 23, 2016 - Fri.Jul 29, 2016

article thumbnail

Infographic: The 5 phases of a ransomware attack

Tech Republic Security

How to defend against attackers and avoid ransom demands.

article thumbnail

Why CGC Matters to Me

ForAllSecure

By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CRTC ENFORCEMENT ADVISORY: REMEMBER, YOU MUST HAVE RECORDS TO PROVE CONSENT

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) issued an enforcement advisory to both businesses and individuals that send commercial electronic […].

article thumbnail

Zero Days: Why the disturbing Stuxnet documentary is a must-see

Tech Republic Security

Zero Days is a documentary by Oscar-winning filmmaker Alex Gibney about the cyberwarfare Pandora's Box that was opened with the Stuxnet malware. Find out why Jack Wallen highly recommends the film.

Malware 129
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

TiaraCon to bring more women into critical, lucrative cybersecurity jobs that are going unfilled

Tech Republic Security

A 2-day mini-conference called TiaraCon aims to connect women interested in the cybersecurity field with job contacts and mentoring to create more inclusive work environments.

article thumbnail

Kevin Mitnick: User training could have prevented DNC email hacks

Tech Republic Security

Everyone from famed hacker Kevin Mitnick to the IEEE Computer Society agree that a little end user training goes a long way in preventing phishing attacks.

Hacking 113

LifeWorks

More Trending

article thumbnail

IoT hidden security risks: How businesses and telecommuters can protect themselves

Tech Republic Security

There are a plethora of IoT-connected devices that create a huge security risk for companies, whether at the corporate office, or at an employee's home office.

IoT 113
article thumbnail

New US cybersecurity plan makes it easier for businesses to get help after an attack

Tech Republic Security

US President Barack Obama recently published a policy directive for cyber incident coordination, which outlines how the government should respond to cybersecurity attacks.

article thumbnail

Data vs. cyber threats: New IBM app uses analytics to fight back

Tech Republic Security

IBM recently released QRadar User Behavior Analytics, a new app that analyzes usage patterns to determine insider threats.

article thumbnail

10 tips to avoid ransomware attacks

Tech Republic Security

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Tech Republic Security

The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report.

article thumbnail

Why an eye scan could soon unlock Samsung and Apple phones

Tech Republic Security

Leaked images and rumors surrounding the Galaxy Note 7 and 2018 iPhone suggest that users can unlock phones and potentially make purchases with an iris scanning camera. Here's how it would work.

113
113
article thumbnail

Video: Why political organizations' lax security practices are 'red meat for hackers'

Tech Republic Security

TechRepublic's Dan Patterson and podcaster Justin Robert Young discussed the latest hacks on the DNC and why attacks are becoming more common.

Hacking 112
article thumbnail

SmartFlow Professional wants to help you stop software piracy and collect lost revenue

Tech Republic Security

SmartFlow Professional is designed to stop revenue loss due to piracy. This entry-level software package has just received a makeover, which is great for small developers who build expensive software.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.