Sat.Oct 15, 2016 - Fri.Oct 21, 2016

article thumbnail

IBM and SBI Securities test bond trading on the blockchain

Tech Republic Security

SBI Securities will adopt the Hyperledger Fabric and work with IBM to test the application of blockchain technology for operational processes and security around bond trading.

article thumbnail

Full(er) House: Exposing high-end poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social Engineering – The Mental Game, Part I.

NopSec

The first thing that all organizations need to understand is why social engineering works. In many cases organizations, security professionals, and people understand what the attacks are, phishing, physical impersonations, etc. But why does this work and why is it so successful when it is used? In its simplest form, social engineering is an attack that focuses on the human element in the security context.

article thumbnail

October is National Cyber Security Awareness Month: How secure is your enterprise?

Tech Republic Security

It's National Cyber Security Awareness Month. Enterprises of all sizes should take time to educate their workforce on lurking cyber security threats.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Zero in on IT security risks by applying the 80/20 rule to vulnerability assessments

Tech Republic Security

It is impossible to defend everything; the Pareto Principle, also known as the 80/20 rule, is one way for IT security pros to determine what's most important to protect.

Risk 167
article thumbnail

MIT students and others to teach IBM Watson about cybersecurity

Tech Republic Security

Enterprise IT risks are growing seemingly faster than security professionals can keep up. Enter artificial intelligence as their latest defense mechanism.

LifeWorks

More Trending

article thumbnail

Five essential cybersecurity podcasts for IT professionals

Tech Republic Security

A curated list of cybersecurity podcasts to help security experts and enthusiasts stay on top of emerging threats.

article thumbnail

How to use Apple Configurator 2 to simplify deploying iOS upgrades OTA

Tech Republic Security

Follow these steps to create a configuration file in Apple Configurator 2 that you can deploy to end users or push via MDM to manage settings on devices over-the-air (OTA).

166
166
article thumbnail

US police storing facial image data of 117 million Americans, report says

Tech Republic Security

26 states now let law enforcement use face recognition tech to search driver's license and ID photos, creating a "virtual line-up" of residents.

166
166
article thumbnail

How to configure G Suite for HIPAA compliance

Tech Republic Security

You can use G Suite and comply with HIPAA, but you'll need to spend some time configuring your Admin console settings.

166
166
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to manage user security in Samba

Tech Republic Security

When securing your Samba shares, start by locking down user and group security. Follow this tutorial to learn how.

166
166
article thumbnail

How banks fight back against cyberattacks

Tech Republic Security

Financial services companies are lucrative targets for hackers. Cybersecurity risk management expert Ertem Osmanoglu explains what data hackers are after and how companies should respond to attacks.

Banking 164
article thumbnail

3D printing hack: Researchers crash drone with sabotaged propeller

Tech Republic Security

Researchers from three universities recently completed an attack on a 3D additive manufacturing system, highlighting the impact of potential security vulnerabilities in such systems.

article thumbnail

Microsoft custom tailors Office 365 and Azure cloud for Department of Defense

Tech Republic Security

Microsoft recently updated its Government Cloud with two new regions, custom versions of Office 365 and Azure, and DoD Impact Level 5 readiness.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

GoDaddy ups security with email encryption and archiving for Office 365 users

Tech Republic Security

GoDaddy recently announced that they were offering specific new security features for their customers who use Office 365.

article thumbnail

Predicting Hearthstone game outcome with machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.