Apple Pay: The smart person's guide
Tech Republic Security
JUNE 6, 2017
Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.
Tech Republic Security
JUNE 6, 2017
Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.
Lenny Zeltser
JUNE 7, 2017
Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Privacy and Cybersecurity Law
JUNE 7, 2017
The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.
Tech Republic Security
JUNE 6, 2017
At Infosecurity Europe 2017, High-Tech Bridge reported on the latest cybersecurity trends, touching on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JUNE 9, 2017
In a blog post, Microsoft called Windows 10 S its "latest and most hardened operating system," and explained how it protects users against ransomware and other threats.
Tech Republic Security
JUNE 6, 2017
Researchers at Ben-Gurion University of the Negev recently demonstrated a hacking technique that utilizes a router's LED to transmit sensitive information.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JUNE 9, 2017
The SambaCry vulnerability has the potential to impact Red Hat Enterprise Linux versions 5-7. Learn how to mitigate this threat in a Red Hat environment.
Tech Republic Security
JUNE 9, 2017
At the Corporate Governance conference in New York, Citrix CEO Kirill Tatarinov said that businesses were hoarding Bitcoin to pay off ransomware attacks.
Tech Republic Security
JUNE 8, 2017
The Linux.MulDrop.14 trojan specifically targets Raspberry Pi devices running older versions of the official Raspbian OS.
Tech Republic Security
JUNE 5, 2017
If you're concerned about ransomware or other malicious bits getting onto your Android device, Jack Wallen offers up three things you can do to help protect your mobile experience from attack.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
JUNE 5, 2017
As ransomware continues to grow exponentially, more and more users and corporations are being affected and finding themselves at a crossroad: To pay or not to pay?
Tech Republic Security
JUNE 5, 2017
At the HPE Discover conference in Las Vegas, HPE unveiled its new Gen 10 ProLiant servers and a new compute experience for enterprise IT.
Tech Republic Security
JUNE 7, 2017
Tech companies should develop encryption methods that protect privacy, but also allow authorities access to content when crime is involved, James Clapper told the National Press Club on Wednesday.
Tech Republic Security
JUNE 6, 2017
Researchers are busy exploring why software vulnerabilities still exist, as well as creative ways to change users' attitudes about cybersecurity.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
JUNE 5, 2017
Don't let your device fall prey to ransomware. Follow these easy tips.
Tech Republic Security
JUNE 9, 2017
Those running new Pi boards or who have updated to latest version of the default Raspbian OS should be protected.
Tech Republic Security
JUNE 5, 2017
The proportion of PCs used by healthcare bodies running Windows XP has increased, according to new report.
Let's personalize your content