Sat.Jul 08, 2017 - Fri.Jul 14, 2017

article thumbnail

VMware NSX: The smart person's guide

Tech Republic Security

VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.

146
146
article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Internet 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

article thumbnail

Knowledge (Data) is Power in Vulnerability Management

NopSec

Data is power virtually everywhere, and it’s all about how you utilize that information. In business, you can use data to grow your company, stay ahead of your competitors, develop new products, and more. In sports, data means the ability to efficiently identify the weaknesses of your opponents, develop better plays, and optimize practice and overall fitness regimens of your team among other things.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

macOS users beware: A new and nearly undetectable malware is on the rise

Tech Republic Security

Often thought of as impenetrable, macOS is falling prey to a sneaky malware that's stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here.

Malware 135
article thumbnail

Understanding how people use private browsing

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

More Trending

article thumbnail

With this $7 malware, anyone can be a hacker for cheap

Tech Republic Security

Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions.

Malware 145
article thumbnail

Your website suffers 22 cyberattacks per day, here's how to stay protected

Tech Republic Security

New research from SiteLock reveals that no website is too small to hack. Here is the data showing who is most vulnerable, and what mediums cybercriminals use to compromise sites.

Hacking 123
article thumbnail

Top 5: Things to know about cloud security

Tech Republic Security

Knowing the basics of cloud security can help you pick a better cloud provider. Here are five bits of important information.

150
150
article thumbnail

These 6 companies are the worst at giving away your data

Tech Republic Security

The Electronic Frontier Foundation's Who Has Your Back report takes a look at how tech companies share user data with the government. Here are the lowest performers.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why IoT education is necessary to protect yourself from cyber attacks

Tech Republic Security

An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discussed various devices that could be connected in the future, and how they might impact consumers, governments, and industries.

Education 112
article thumbnail

Almost half of IT security incidents are caused by company employees, report says

Tech Republic Security

Uninformed or careless employees are one of the top causes of a cybersecurity incident, according to a Kaspersky Lab report.

article thumbnail

Why Windows Phone users are now a serious security risk to their employers

Tech Republic Security

Microsoft has ended support for Windows Phone 8.1, meaning users will no longer receive important updates. Here's how your business can respond.

Risk 114
article thumbnail

Video: Use the data breach calculator to determine how much cyber-intrusions might cost your company

Tech Republic Security

The cost of digital theft rose by 5% this year. Wendi Whitmore leads the IMB Security X-Force Incident Response & Intelligence Services team. She explains how your company can lower the cost of cyber-intrusions.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

VMware, Trend Micro offer unified approach to enterprise mobile security with new partnership

Tech Republic Security

Trend Micro's cybersecurity solutions are coming to VMware Workspace ONE and VMware AirWatch to help IT leaders protect devices from a growing number of mobile attacks.

Mobile 101
article thumbnail

Why your company needs clear security policies: A cautionary tale

Tech Republic Security

An IT employee was recently almost fired for storing documents on Dropbox. Here's how the employee and the company could have prevented that situation.

101
101
article thumbnail

To update or not to update: There is no question

Tech Republic Security

Updating software has become one of the many keys to data security. Jack Wallen explains why the excuses for failing to update must become a thing of the past.

article thumbnail

5 things to know about cloud security

Tech Republic Security

To be safe with cloud storage, you need to know how it works. Here are five basic issues to look for.

120
120
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Fairness-verification tool helps avoid illegal bias in algorithms

Tech Republic Security

Researchers suggest human bias influences algorithms more than we realize, and offer a solution to weed the bias out. They received a $1 million National Science Foundation grant for their project.

89
article thumbnail

Video: So your company was hit with ransomware. Now what?

Tech Republic Security

Vincent Weafer, Vice President of McAfee Labs, explains the technology why the Petya and WannaCry outbreaks were so virulent, and what you can do when your company is exposed to a cyberattack.

article thumbnail

Android Security Bulletin July 2017: What you need to know

Tech Republic Security

July brought to a drastic reduction in critical-level vulnerabilities found in Android. Get the highlights.

107
107
article thumbnail

Windows 10 security: HoloLens gets first Patch Tuesday fix from Microsoft

Tech Republic Security

The fix for the HoloLens remote code execution was released as part of Tuesday's bundle of more than 50 security patches.

98
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Video: Travel deep down the Dark Web with IBM Security

Tech Republic Security

Ever wonder how hackers make money? Or where stolen corporate data is resold? What about cyberweapons and hacking tools? Etay Maor, Executive Security Advisor of IBM Security, shows us the 'Amazon of the Dark Web.

Hacking 65
article thumbnail

How a data breach can negatively impact your company's stock price

Tech Republic Security

A new report from Comparitech details how cyberattacks change the reputation of a company, and can hurt its value in the market.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a “ Quick-Response Checklist ” for HIPPA covered entities and business associates to follow when responding to a ransomware attack or other “cyber-related security incident,” as that phrase is defined under the HIPAA Security Rule. 45 C.F.R. 164.304.

article thumbnail

Eric Trump during the campaign: "You can't allow [hackers] to attack the government."

Tech Republic Security

If America is hacked the country must show backbone, the president's son told TechRepublic during the 2016 campaign. A year later, are we more secure?

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Video: Researchers predict large-scale cyberattack against US infrastructure in the next two years

Tech Republic Security

Only 26% of respondents in a study published by Black Hat Research were confident that the US government, under president Trump, would be able to react correctly to a major breach.

article thumbnail

Video: Donald Trump Jr.: Cyber-attacks are among the biggest security threats facing our country

Tech Republic Security

During the presidential campaign at the 2016 New Hampshire primary, Donald Trump Jr. told TechRepublic cybersecurity is one of country's biggest challenges and the president would thwart attacks by hiring the "best of the best.

article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. The joint report carried an urgent amber warning, which is the second-highest rating for the sensitivity of a threat.

article thumbnail

Video: Eric Trump: Hacking has been happening for years and we have to stop it

Tech Republic Security

"Every single day American companies are being hacked.

Hacking 106
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.