Sat.Jun 24, 2017 - Fri.Jun 30, 2017

article thumbnail

Ukraine is a test bed for global cyberattacks that will target major infrastructure

Tech Republic Security

On the ground in Kiev, TechRepublic got a first-hand look at the frontline of a cyberwar that involves alleged Russian state-sponsored hackers, organized crime, and lone-wolf attackers.

167
167
article thumbnail

Kali Drones, Portable CTF Builds, Raspberry Pi Craziness and More!

Kali Linux

The Kali community is a pretty crazy thing. There are folks all over the world doing interesting things with Kali Linux and far too often, these cool projects get overlooked. Part of the problem is that the community is spread out all over the ’net. We’re continuing to help build the Kali community to help with this problem, but that’s a slightly longer topic.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

The True Cost of A Great Penetration Test

NopSec

If you asked car salesmen from different dealerships the question, “How much does a great car cost?” you’re guaranteed to get different answers and rarely any consistent dollar amount, depending on who they are and the type of person they perceive you to be. “Never buy used American cars. Get Japanese ones. We have some in the lot. Cheap, but it works.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The world needs more cybersecurity pros, but millennials aren't interested in the field

Tech Republic Security

Only 7% of cybersecurity workers are under age 29, and just 11% are women. Here's how your business can better recruit younger, more diverse cybersecurity workers.

article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

LifeWorks

More Trending

article thumbnail

The next generation of cybersecurity professionals is being created by the Girl Scouts

Tech Republic Security

Girl Scouts of the USA is rolling out a set of 18 new cybersecurity badges next year, to teach young women in grades K-12 programming, ethical hacking, and identity theft prevention.

article thumbnail

Contractors lose jobs after hacking CIA's in-house vending machines

Tech Republic Security

There is some irony in that CIA vending machines were hacked, especially when there may be more at stake than the machines' contents.

Hacking 164
article thumbnail

Report: 37% of adults at 'serious risk' of being hacked through their IoT devices

Tech Republic Security

Fitness trackers, smart TVs, and children's toys are extremely vulnerable to cyberattacks, but consumers don't know how to protect them, according to a new report from BullGuard.

IoT 164
article thumbnail

How to deter hackers: Follow these digital safety best practices

Tech Republic Security

Nothing guarantees perfect online security. But these checklists will help lock down and protect your digital life, keeping you one step ahead of the bad guys.

161
161
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Report: 2.5 million people fell victim to ransomware last year, up 11% from 2016

Tech Republic Security

Ransomware attacks continue to rise worldwide, with the US experiencing the most mobile ransomware threats in the past year, according to a new report from Kaspersky Lab.

article thumbnail

10 tips to help reduce user account lockouts and password resets

Tech Republic Security

User account administration can waste a lot of precious time and effort, on everyone's part. Here are 10 tips, five for users and five for admins, to reduce the hassle.

article thumbnail

iOS and Android security: A timeline of the highlights and the lowlights

Tech Republic Security

iOS and Android security has evolved from nice to have in the platforms' early days to essential. Here's an overview of iOS and Android security features, attacks, and patches through the years.

160
160
article thumbnail

6 tips to avoid ransomware after Petya and WannaCry

Tech Republic Security

Ransomware attacks continue to wreak havoc on businesses worldwide. Here are six recommendations from PwC to prevent and mitigate these cybercrimes.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Free security solution will block malware, zero-day attacks

Tech Republic Security

Cybersecurity provider Comodo is offering a new endpoint detection and response solution free to enterprise users.

Malware 154
article thumbnail

Most IoT devices are an attack waiting to happen, unless manufacturers update their kernels

Tech Republic Security

The security of IoT devices rests squarely on the shoulders of manufacturers. Jack Wallen explains and offers up the one solution that could go a long way to securing IoT.

article thumbnail

How the GoldenEye/Petya ransomware attack reveals the sorry state of cybersecurity

Tech Republic Security

The latest global ransomware outbreak has rapidly affected governments and organizations around the world. The worst part? We should have known better.

article thumbnail

Ransomware attacks: Here's what we need to learn from WannaCry and Petya

Tech Republic Security

Ransomware is here to stay, which means it's time to make a few changes to how we respond.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Windows 10 snooping: Microsoft has halved data it collects from PCs says watchdog

Tech Republic Security

The French regulator CNIL announced that Windows 10 now complies with the country's data protection laws, following changes to how the OS handles user privacy.

146
146
article thumbnail

Petya ransomware: Where it comes from and how to protect yourself

Tech Republic Security

The attack highlights the growing danger of compromised third-party software being used to spread malware throughout firms.

article thumbnail

Fileless malware: The smart person's guide

Tech Republic Security

Fileless malware uses system files and functions native to the operating systems to evade detection and deliver its payload. Learn more about this invisible threat and the best approach to combat it.

Malware 143
article thumbnail

Cisco Live 2017: Chuck Robbins discusses networking, security and the acceleration of the Apple partnership

Tech Republic Security

Chuck Robbins, CEO of Cisco, sat down with TechRepublic Senior Writer Teena Maddox in an exclusive interview to discuss Cisco's partnership with Apple, the new era of networking, and security.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Report: Twice as many IT professionals plan to build formal security teams in 2017

Tech Republic Security

A survey of security professionals reveals that more enterprises are preparing for breaches as attacks increase. Here are 8 takeaways.

141
141
article thumbnail

How to get private encrypted notes with Standard Notes

Tech Republic Security

If you're looking for a cloud-based note taking tool that offers solid encryption and ease of use, Standard Notes could be exactly what you need.

article thumbnail

Windows 10 adds end-to-end security to the Fall Creators Update

Tech Republic Security

Microsoft is ramping up Windows 10 security features, using cloud intelligence to better detect and respond to attacks. Here's how it could help your enterprise.

134
134
article thumbnail

Worried about attacks? Maybe you're not getting hacked enough, report finds

Tech Republic Security

A HackerOne report makes it clear that bounty programs work. So why aren't more companies using them?

Hacking 132
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

US to head off laptop ban on international flights with revised security requirements

Tech Republic Security

New security measures for certain foreign flights to the US will stop the ban on large electronics from expanding, according to new reports.

129
129
article thumbnail

Video: Inside the Kiev startup scene

Tech Republic Security

Igor Ovcharenko, Business Developer at Geneva-based Seedstars, explains why entrepreneurs from tech companies around the world are coming to Ukraine to start new, innovative companies

129
129
article thumbnail

Video: Why machine learning for defensive cybersecurity is a good idea

Tech Republic Security

Mathematician Miranda Mowbray explains how machine learning - the application of statistics to decision problems - can help organizations defend against large scale threats.

article thumbnail

Global Cybersecurity Summit 2017: Are cybersecurity dollars being spent effectively?

Tech Republic Security

A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine discuss where to allocate the billions of dollars spent on cybersecurity.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!