Infographic: The 5 phases of a ransomware attack
Tech Republic Security
JULY 28, 2016
How to defend against attackers and avoid ransom demands.
Tech Republic Security
JULY 28, 2016
How to defend against attackers and avoid ransom demands.
ForAllSecure
JULY 26, 2016
By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Privacy and Cybersecurity Law
JULY 27, 2016
The Canadian Radio-television and Telecommunications Commission (CRTC) issued an enforcement advisory to both businesses and individuals that send commercial electronic […].
Tech Republic Security
JULY 25, 2016
Zero Days is a documentary by Oscar-winning filmmaker Alex Gibney about the cyberwarfare Pandora's Box that was opened with the Stuxnet malware. Find out why Jack Wallen highly recommends the film.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JULY 29, 2016
A 2-day mini-conference called TiaraCon aims to connect women interested in the cybersecurity field with job contacts and mentoring to create more inclusive work environments.
Tech Republic Security
JULY 29, 2016
Everyone from famed hacker Kevin Mitnick to the IEEE Computer Society agree that a little end user training goes a long way in preventing phishing attacks.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JULY 28, 2016
There are a plethora of IoT-connected devices that create a huge security risk for companies, whether at the corporate office, or at an employee's home office.
Tech Republic Security
JULY 27, 2016
US President Barack Obama recently published a policy directive for cyber incident coordination, which outlines how the government should respond to cybersecurity attacks.
Tech Republic Security
JULY 28, 2016
IBM recently released QRadar User Behavior Analytics, a new app that analyzes usage patterns to determine insider threats.
Tech Republic Security
JULY 26, 2016
As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
JULY 25, 2016
The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report.
Tech Republic Security
JULY 28, 2016
Leaked images and rumors surrounding the Galaxy Note 7 and 2018 iPhone suggest that users can unlock phones and potentially make purchases with an iris scanning camera. Here's how it would work.
Tech Republic Security
JULY 28, 2016
TechRepublic's Dan Patterson and podcaster Justin Robert Young discussed the latest hacks on the DNC and why attacks are becoming more common.
Tech Republic Security
JULY 26, 2016
SmartFlow Professional is designed to stop revenue loss due to piracy. This entry-level software package has just received a makeover, which is great for small developers who build expensive software.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Let's personalize your content