Sat.Jul 08, 2017 - Fri.Jul 14, 2017

article thumbnail

Top 5: Things to know about cloud security

Tech Republic Security

Knowing the basics of cloud security can help you pick a better cloud provider. Here are five bits of important information.

162
162
article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Internet 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

article thumbnail

Knowledge (Data) is Power in Vulnerability Management

NopSec

Data is power virtually everywhere, and it’s all about how you utilize that information. In business, you can use data to grow your company, stay ahead of your competitors, develop new products, and more. In sports, data means the ability to efficiently identify the weaknesses of your opponents, develop better plays, and optimize practice and overall fitness regimens of your team among other things.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

VMware NSX: The smart person's guide

Tech Republic Security

VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.

161
161
article thumbnail

Understanding how people use private browsing

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

LifeWorks

More Trending

article thumbnail

With this $7 malware, anyone can be a hacker for cheap

Tech Republic Security

Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions.

Malware 156
article thumbnail

macOS users beware: A new and nearly undetectable malware is on the rise

Tech Republic Security

Often thought of as impenetrable, macOS is falling prey to a sneaky malware that's stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here.

Malware 148
article thumbnail

Almost half of IT security incidents are caused by company employees, report says

Tech Republic Security

Uninformed or careless employees are one of the top causes of a cybersecurity incident, according to a Kaspersky Lab report.

article thumbnail

Your website suffers 22 cyberattacks per day, here's how to stay protected

Tech Republic Security

New research from SiteLock reveals that no website is too small to hack. Here is the data showing who is most vulnerable, and what mediums cybercriminals use to compromise sites.

Hacking 144
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

5 things to know about cloud security

Tech Republic Security

To be safe with cloud storage, you need to know how it works. Here are five basic issues to look for.

140
140
article thumbnail

Why IoT education is necessary to protect yourself from cyber attacks

Tech Republic Security

An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discussed various devices that could be connected in the future, and how they might impact consumers, governments, and industries.

Education 138
article thumbnail

Why your company needs clear security policies: A cautionary tale

Tech Republic Security

An IT employee was recently almost fired for storing documents on Dropbox. Here's how the employee and the company could have prevented that situation.

133
133
article thumbnail

Why Windows Phone users are now a serious security risk to their employers

Tech Republic Security

Microsoft has ended support for Windows Phone 8.1, meaning users will no longer receive important updates. Here's how your business can respond.

Risk 129
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

These 6 companies are the worst at giving away your data

Tech Republic Security

The Electronic Frontier Foundation's Who Has Your Back report takes a look at how tech companies share user data with the government. Here are the lowest performers.

article thumbnail

Android Security Bulletin July 2017: What you need to know

Tech Republic Security

July brought to a drastic reduction in critical-level vulnerabilities found in Android. Get the highlights.

129
129
article thumbnail

VMware, Trend Micro offer unified approach to enterprise mobile security with new partnership

Tech Republic Security

Trend Micro's cybersecurity solutions are coming to VMware Workspace ONE and VMware AirWatch to help IT leaders protect devices from a growing number of mobile attacks.

Mobile 122
article thumbnail

How a data breach can negatively impact your company's stock price

Tech Republic Security

A new report from Comparitech details how cyberattacks change the reputation of a company, and can hurt its value in the market.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Windows 10 security: HoloLens gets first Patch Tuesday fix from Microsoft

Tech Republic Security

The fix for the HoloLens remote code execution was released as part of Tuesday's bundle of more than 50 security patches.

113
113
article thumbnail

To update or not to update: There is no question

Tech Republic Security

Updating software has become one of the many keys to data security. Jack Wallen explains why the excuses for failing to update must become a thing of the past.

Software 113
article thumbnail

Video: Use the data breach calculator to determine how much cyber-intrusions might cost your company

Tech Republic Security

The cost of digital theft rose by 5% this year. Wendi Whitmore leads the IMB Security X-Force Incident Response & Intelligence Services team. She explains how your company can lower the cost of cyber-intrusions.

article thumbnail

Fairness-verification tool helps avoid illegal bias in algorithms

Tech Republic Security

Researchers suggest human bias influences algorithms more than we realize, and offer a solution to weed the bias out. They received a $1 million National Science Foundation grant for their project.

112
112
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Video: So your company was hit with ransomware. Now what?

Tech Republic Security

Vincent Weafer, Vice President of McAfee Labs, explains the technology why the Petya and WannaCry outbreaks were so virulent, and what you can do when your company is exposed to a cyberattack.

article thumbnail

Video: Travel deep down the Dark Web with IBM Security

Tech Republic Security

Ever wonder how hackers make money? Or where stolen corporate data is resold? What about cyberweapons and hacking tools? Etay Maor, Executive Security Advisor of IBM Security, shows us the 'Amazon of the Dark Web.

Hacking 82
article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation […].

article thumbnail

Eric Trump during the campaign: "You can't allow [hackers] to attack the government."

Tech Republic Security

If America is hacked the country must show backbone, the president's son told TechRepublic during the 2016 campaign. A year later, are we more secure?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Video: Researchers predict large-scale cyberattack against US infrastructure in the next two years

Tech Republic Security

Only 26% of respondents in a study published by Black Hat Research were confident that the US government, under president Trump, would be able to react correctly to a major breach.

article thumbnail

Video: Donald Trump Jr.: Cyber-attacks are among the biggest security threats facing our country

Tech Republic Security

During the presidential campaign at the 2016 New Hampshire primary, Donald Trump Jr. told TechRepublic cybersecurity is one of country's biggest challenges and the president would thwart attacks by hiring the "best of the best.

article thumbnail

Video: Eric Trump: Hacking has been happening for years and we have to stop it

Tech Republic Security

"Every single day American companies are being hacked.

Hacking 113
article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. The joint report carried an urgent amber warning, which is the second-highest rating for the sensitivity of a threat.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!