Sat.Nov 05, 2016 - Fri.Nov 11, 2016

article thumbnail

Video: FBI cybersecurity chief talks about aftermath of Wikileaks, Snowden, and 2016 election

Tech Republic Security

The FBI has a long legacy of being at the forefront of technology, but managing those systems while keeping up with the latest advances in tech is an unforgiving task.

article thumbnail

Royal flush: an in-depth look at poker cheating devices accessories

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five password management apps that will work on all your devices

Tech Republic Security

Password security is essential. We have more passwords than ever before and most of us don't take them seriously. You can keep yourself safe with a password manager: Here are five worth checking out.

article thumbnail

UK to invest $2.3B in cybersecurity, calls for stronger authentication

Tech Republic Security

Over the next five years, the UK government will invest heavily in cybersecurity, including new authentication methods such as Fast IDentity Online (FIDO).

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

Hacking 167
article thumbnail

Every cloud needs a cop: How the FBI secures its digital assets

Tech Republic Security

At the 2016 Structure Conference, FBI CISO Arlette Hart explained how the bureau approaches security and manages its systems.

CISO 167

LifeWorks

More Trending

article thumbnail

Connected cars provide big value, but major risks, for automakers

Tech Republic Security

The data produced by connected automobiles has the potential to make drivers' lives easier, but it also presents key challenges for manufacturers.

article thumbnail

How to manage multiple GPG keys in Thunderbird

Tech Republic Security

When you have multiple email accounts and each one has a different encryption key, find out how to assign the right key to the right address in Thunderbird.

article thumbnail

Hackers attempt DDoS attacks on Clinton and Trump campaign websites using Mirai botnet

Tech Republic Security

This week, hackers attempted four 30-second HTTP layer 7 attacks targeting the campaign websites of Clinton and Trump. Here's what you need to know.

DDOS 167