Sat.Dec 31, 2016 - Fri.Jan 06, 2017

article thumbnail

Windows 10: Is Microsoft preparing to fix one of its users' biggest complaints?

Tech Republic Security

Microsoft appears to be getting ready to address some complaints about Windows 10, as well as holding its hands up to getting too aggressive in its upgrade push.

167
167
article thumbnail

NYDFS Cybersecurity Regulations: Will You Be Ready?

NopSec

When new cybersecurity regulations from the New York Department of Financial Services (NYDFS) take effect on March 1, 2017, financial institutions will have 180 days to implement them. If you think that doesn’t give you much time to ensure compliance, you are right. To help you prepare, today we provide an overview of the four main areas where affected organizations should be ready to put their resources to comply with the new laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ethics principles big data analysts must follow

Tech Republic Security

We trust big data and its processing far too much, according to Altimeter analysts. Get tips on incorporating ethics into your analytics projects.

Big data 167
article thumbnail

A visual map of emerging cybersecurity trends

Tech Republic Security

A study by TechRepublic and data firm Affinio reveals the social media communities and influencers talking about IoT, ransomware, bots, and other cybersecurity threats.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

HR managers beware: Ransomware could be your next job applicant

Tech Republic Security

A new campaign to distribute ransomware known as GoldenEye takes aim at HR departments via fake job applications. Here's how to keep your company safe.

article thumbnail

6 ways to secure air-gapped computers from data breaches

Tech Republic Security

Once upon a time, air-gapped computers were impossible to breach. That is no longer the case. Jack Wallen offers security advice for those who deploy such machines.

LifeWorks

More Trending

article thumbnail

Apple's iCloud Keychain: The smart person's guide

Tech Republic Security

This is a comprehensive guide to iCloud Keychain, Apple's cloud-based version of its iOS and macOS password, private key, and certificate management software.

Passwords 122
article thumbnail

Android Security Bulletin January 2017: What you need to know

Tech Republic Security

Although there is only one new critical vulnerability in the January 2017 Android Security Bulletin, there are plenty of flaws this month. Get the highlights.

108
108
article thumbnail

Digital forensics. in less than two minutes

Tech Republic Security

There's always evidence, even in the most complicated of computer crimes. Find out what digital forensics is and what it's used for. in less than two minutes.

65
article thumbnail

Video: Rudy Giuliana explains how we need to fix the cybersecurity crisis

Tech Republic Security

At CES 2017, we spoke with BlackBerry CEO John Chen and former New York City Mayor Rudy Giuliana about cybersecurity. Giuliani, who works as a security consultant, shared his two keys to the future.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.