Sat.Apr 08, 2017 - Fri.Apr 14, 2017

article thumbnail

5 ways robots are vulnerable to cyberattacks

Tech Republic Security

Robotic devices flooding the IoT market are insecure, according to IOActive researchers. Authentication and privacy issues are some of the cybersecurity risks the researchers found.

IoT 162
article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

52
article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

6 common enterprise cybersecurity threats and how to avoid them

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.

IoT 158
article thumbnail

3 Dangerous Myths About DDoS Attacks

NopSec

Distributed denial of service (DDoS) attacks are a growing but frequently misunderstood threat in the cybersecurity world. Defined generally, a DDoS attack occurs when an adversary directs traffic that is either large in volume or ill-formed against a service in order to render that service unavailable to legitimate users. Today, we seek to combat a few common myths about DDoS attacks that may be standing in the way of organizations’ ability to effectively mitigate these threats.

DDOS 40

LifeWorks

More Trending

article thumbnail

Mobile devices with Broadcom chipsets may be vulnerable to Wi-Fi hijacking

Tech Republic Security

Learn about new developments to a Wi-Fi vulnerability and how to protect mobile devices from it.

Mobile 150
article thumbnail

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Security

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.

Big data 150
article thumbnail

What kinds of people fall prey to identity theft, phishing, and hacks? It's not who you think

Tech Republic Security

Think of an identity theft victim and a few stereotypes probably come to mind, but a new study from CBT Nuggets reveals that the majority of victims are anything but stereotypical.

article thumbnail

5 tips for securing your Docker containers

Tech Republic Security

Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.

141
141
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Android Security Bulletin April 2017: What you need to know

Tech Republic Security

The April 2017 Android Security Bulletin turned out to be yet another month with the platform once again topping its previous number of critical flaws. Get the highlights.

133
133
article thumbnail

'Critical' Microsoft Office hack uses fake Word documents to install malware

Tech Republic Security

A new exploit, reported by McAfee, uses trick Microsoft office files to install malware on a user's machine and can bypass existing protection methods.

Malware 133
article thumbnail

How to secure your Internet of Things

Tech Republic Security

The Internet of Things is a security nightmare. Here are a few ways to protect your devices and data.

Internet 127
article thumbnail

Uber accused of using 'Hell' software program for industrial espionage against Lyft

Tech Republic Security

Uber has been quietly tracking the locations of Lyft drivers, how many Lyft drivers work for Uber, and more, according to a report by The Information.

Software 122
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Research shows smartphone fingerprint scanners aren't as secure as we think they are

Tech Republic Security

Researchers from two universities were able to spoof some fingerprint-based security systems, demonstrating the possibility of creating a master print to unlock phones.

122
122
article thumbnail

Video: How to avoid cybersecurity incidents when building a global system

Tech Republic Security

At the 2017 Midmarket CIO Forum, Jeff Young of Haynes International explains the challenges in creating a global ERP after winning the Midmarket CIO Award.

article thumbnail

Why employees in Sweden are opting to be implanted with NFC-enabled microchips

Tech Republic Security

A Swedish company called Epicenter is giving employees the option to be implanted with rice-size chips that use a magnetic field to transfer data.

81
article thumbnail

Video: Go cyber-threat hunting with an enterprise malware expert

Tech Republic Security

Infocyte founder and former Air Force cybersecurity expert Chris Gerritz explains why every company needs a proactive digital defense plan.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Video: How to protect your company from cybercrime

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained the biggest cyber threats facing the enterprise, and how CIOs can keep their organization safe.