Sat.Jul 30, 2016 - Fri.Aug 05, 2016

article thumbnail

How to set up quick and easy file sharing with Samba

Tech Republic Security

If you want to use a Linux desktop or server to share files, see how simple it can be with the help of Samba.

133
133
article thumbnail

What are malicious usb keys and how to create a realistic one?

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to avoid credential stuffing attacks

Tech Republic Security

Hackers used data stolen from a gaming site to get logins to a British mobile network's site. Learn about how it happened and what you can to do protect yourself.

Mobile 122
article thumbnail

Why threat hunting as-a-service is worth considering, but 'not a silver bullet'

Tech Republic Security

Accenture and Endgame Inc. seek to detect and remove cyber threats from organizations' systems, but their solution may be only part of a strong security plan.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

IBM X-Force finds major malware hitting Brazil banks ahead of 2016 Olympics in Rio

Tech Republic Security

IBM X-Force Research recently noted that the Zeus Trojan variant Panda has spread to Brazil, days before the Opening Ceremony. Here's what you need to know.

Banking 113
article thumbnail

Getting started with Tails, the encrypted, leave-no-trace operating system

Tech Republic Security

A step-by-step guide on how to download, install, and start using Tails, the world's most secure platform.

LifeWorks

More Trending

article thumbnail

15 US cities with the highest salaries for cybersecurity jobs

Tech Republic Security

Find out which US city outranks San Francisco and New York City as offering the highest salary for information security specialists.

article thumbnail

Google finally adds HSTS encryption to google.com

Tech Republic Security

Google has furthered its encryption efforts with the use of HSTS on its core domain. Forced use of secure HTTPS connections will help protect against attacks.

article thumbnail

New MobileIron report details most common mobile threats and blacklisted apps

Tech Republic Security

MobileIron's latest Mobile Security and Risk Review report shows that despite growing mobile threats, many organizations aren't responding appropriately.

Mobile 113
article thumbnail

Stop procrastinating: Signing emails is now a necessity

Tech Republic Security

If employees don't digitally sign all outgoing emails, Jack Wallen says your company and customer base is at risk. He explains why signing emails has reached critical importance.

Risk 113
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Tor may remain anonymous, thanks to Selfrando

Tech Republic Security

In response to the FBI's ability to bypass Tor, security researchers are beefing up the Tor Browser to keep those who use the Tor Network anonymous.

112
112
article thumbnail

IoT and liability: Who pays when things go wrong?

Tech Republic Security

Product liability pertaining to Internet of Things (IoT) devices is uncharted territory, but that will change in a hurry.

IoT 111
article thumbnail

How Distil Networks uses machine learning to hunt down 'bad bots'

Tech Republic Security

Distil Networks recently raised $21 million to bolster its anti-bot offerings for the enterprise. The company plans to expand globally and grow its workforce.

106
106
article thumbnail

VMware releases AirWatch Express to simplify MDM efforts for SMBs

Tech Republic Security

VMware's new cloud solution, AirWatch Express, helps businesses with app delivery, connectivity, security, and email configuration.

100
100
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

SSHCure: Flow-based attack detection that cuts through the chaff

Tech Republic Security

The amount of actionable attack data pales in comparison to the total amount of information traversing the internet. Learn how researchers are able to ferret out telltale signs from the rest.

article thumbnail

3D printing security risk caused by undetectable defects, and ways to prevent it

Tech Republic Security

3D printing hacks could lead to recalls, lawsuits, property damage, and even put people in danger, researchers find. They present two ways to stave off this security threat.

Risk 86
article thumbnail

How to fix OS X installation 'can't be verified' error

Tech Republic Security

If a verification error is preventing you from installing or upgrading to the latest version of OS X, learn how to resolve it so you can proceed with the installation.

84
article thumbnail

Illumio ASAP eliminates a weak link in data center infrastructures

Tech Republic Security

Illumio's Attack Surface Assessment Program reduces digital communication attack surfaces and hardens your data center against lateral movement and threats.

77
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.