Sat.Mar 11, 2017 - Fri.Mar 17, 2017

article thumbnail

Report: Ransomware attacks grew 600% in 2016, costing businesses $1B

Tech Republic Security

Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.

article thumbnail

We have your data: how to fight ransomware

Andrew Hay

Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Doing Diversity Right: Turning Employment Obstacles into Opportunities

NopSec

Blind assumptions about online security are not the only assumptions that demand attention in the cybersecurity industry today. An article NopSec published late last year (“ Your Money or Your File(s)! “) opens with a familiar image of the popular face of “ransom” in western society’s 80s culture: “A bad person with a foreign accent would kidnap the loved one(s) of a square-jawed, wealthy protagonist and demand a large sum of money for their safe return.

article thumbnail

New technique claims '100% protection' against internet cyberattacks

Tech Republic Security

Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.

Internet 151
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Bad news, Android devs: 40 percent of apps in the market are leaving sensitive backdoors exposed

Tech Republic Security

Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.

Marketing 151
article thumbnail

How to enable https on Apache CentOS

Tech Republic Security

For some businesses, serving up websites via HTTPS is a must-have. Here's how to configure secure http Apache on CentOS.

146
146

LifeWorks

More Trending

article thumbnail

Report: 48% more IT professionals are taking security training

Tech Republic Security

As cyber attacks continue to make headlines, more IT professionals are undergoing security training and assessments, paid for by their employers, according to a new report.

article thumbnail

Report: Hybrid cloud dominates in Europe, adoption driven by security concerns

Tech Republic Security

A recent study from NetApp examined the growing use of hybrid cloud infrastructure in Europe, noting that storage and backup were the most listed use cases.

Backups 133
article thumbnail

Researchers use $5 speaker to hack IoT devices, smartphones, automobiles

Tech Republic Security

Cybersecurity researchers from the University of Michigan used sound waves to trick accelerometers and gain backdoor access into systems.

IoT 133
article thumbnail

FBI won't release iPhone hacking tool and is still using it to 'gather intelligence information'

Tech Republic Security

The FBI used a third-party tool to unlock an iPhone used by San Bernardino shooter Syed Farook. Despite opposition, the FBI won't release any details of the tool.

Hacking 133
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How does the enterprise respond to increased security threats? Crosstraining

Tech Republic Security

Lots of IT professionals crosstrained and certified in cybersecurity last year, but that raises a question: Are people seeking out cybersecurity or are they being drafted into the role?

article thumbnail

Why businesses are becoming less concerned about cloud security

Tech Republic Security

Lynn Lucas, CMO of Veritas Technologies, spoke with TechRepublic about how businesses are trying to get to the cloud quickly, and find new ways to manage their data in the cloud.

article thumbnail

The top issues your company needs to consider before implementing file-sharing services

Tech Republic Security

Egnyte's Ronen Vengosh spoke with TechRepublic about why companies need to understand their use case and goals, and consider policy enforcement in file sharing.

79
article thumbnail

Weekend reading: Friday, March 17, 2017

Andrew Hay

We’re back with this week’s edition of “Weekend Reading.” Below are some of the data stories from this week that you just can’t miss. I know that I found each of them beneficial (and equally … The post Weekend reading: Friday, March 17, 2017 appeared first on DataGravity Blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.