Sat.Dec 31, 2016 - Fri.Jan 06, 2017

article thumbnail

A visual map of emerging cybersecurity trends

Tech Republic Security

A study by TechRepublic and data firm Affinio reveals the social media communities and influencers talking about IoT, ransomware, bots, and other cybersecurity threats.

article thumbnail

NYDFS Cybersecurity Regulations: Will You Be Ready?

NopSec

When new cybersecurity regulations from the New York Department of Financial Services (NYDFS) take effect on March 1, 2017, financial institutions will have 180 days to implement them. If you think that doesn’t give you much time to ensure compliance, you are right. To help you prepare, today we provide an overview of the four main areas where affected organizations should be ready to put their resources to comply with the new laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows 10: Is Microsoft preparing to fix one of its users' biggest complaints?

Tech Republic Security

Microsoft appears to be getting ready to address some complaints about Windows 10, as well as holding its hands up to getting too aggressive in its upgrade push.

167
167
article thumbnail

5 ethics principles big data analysts must follow

Tech Republic Security

We trust big data and its processing far too much, according to Altimeter analysts. Get tips on incorporating ethics into your analytics projects.

Big data 167
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

HR managers beware: Ransomware could be your next job applicant

Tech Republic Security

A new campaign to distribute ransomware known as GoldenEye takes aim at HR departments via fake job applications. Here's how to keep your company safe.

article thumbnail

6 ways to secure air-gapped computers from data breaches

Tech Republic Security

Once upon a time, air-gapped computers were impossible to breach. That is no longer the case. Jack Wallen offers security advice for those who deploy such machines.

More Trending

article thumbnail

Apple's iCloud Keychain: The smart person's guide

Tech Republic Security

This is a comprehensive guide to iCloud Keychain, Apple's cloud-based version of its iOS and macOS password, private key, and certificate management software.

Passwords 115
article thumbnail

Android Security Bulletin January 2017: What you need to know

Tech Republic Security

Although there is only one new critical vulnerability in the January 2017 Android Security Bulletin, there are plenty of flaws this month. Get the highlights.

76
article thumbnail

Video: Rudy Giuliana explains how we need to fix the cybersecurity crisis

Tech Republic Security

At CES 2017, we spoke with BlackBerry CEO John Chen and former New York City Mayor Rudy Giuliana about cybersecurity. Giuliani, who works as a security consultant, shared his two keys to the future.

article thumbnail

Digital forensics. in less than two minutes

Tech Republic Security

There's always evidence, even in the most complicated of computer crimes. Find out what digital forensics is and what it's used for. in less than two minutes.

60
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.