Is the Intel Management Engine a backdoor?
Tech Republic Security
JUNE 23, 2016
Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.
Tech Republic Security
JUNE 23, 2016
Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.
Elie
JUNE 5, 2016
Every year, close to 600,000 sites are hacked. Given the scale of the problem, notifying users to prevent harm and webmasters so they can clean up their sites is critical to combat hacking. This post looks at the effectiveness of the current warning strategies used by Google and their long-term impact.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Privacy and Cybersecurity Law
JUNE 16, 2016
On 23 June 2016, the UK is holding a referendum as to whether to stay in the European Union or […].
Tech Republic Security
JUNE 30, 2016
Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
JUNE 22, 2016
The Clinton Foundation's network was allegedly hacked late Tuesday, while a variety of documents from last week's DNC hack were leaked simultaneously, pushing cybersecurity toward center stage.
Tech Republic Security
JUNE 28, 2016
A new report from EMC shows that businesses are tackling traditional cybersecurity issues better, but they are failing to address emerging threats.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JUNE 30, 2016
One device to hand out two-factor authentication tokens isn't always enough. Learn how to use Authy on multiple devices so those tokens are always at the ready.
Tech Republic Security
JUNE 29, 2016
Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.
Tech Republic Security
JUNE 20, 2016
In the heart of Florida's hurricane country, Lee County's Emergency Operations Center uses cutting-edge networking and communications solutions to prepare for any emergency.
Tech Republic Security
JUNE 15, 2016
At a session at the 2016 WWDC, Apple revealed that it would be requiring all iOS apps to use HTTPS connections through an existing feature called App Transport Security by the end of the year.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Tech Republic Security
JUNE 30, 2016
Collaboration and remote sync are a necessity for developers. Learn how to make the process easier by using SparkleShare to connect to a GitHub repository.
Tech Republic Security
JUNE 17, 2016
Businesses and government organisations are starting to recruit ethical hackers to ensure their security processes are up to scratch.
Tech Republic Security
JUNE 29, 2016
Google recently launched a new page called My Activity that shows you a history of your online activities and interactions with its products.
Tech Republic Security
JUNE 2, 2016
An Information Security manager makes the case for an analytical approach to stem the staggering number of data breaches suffered by the healthcare industry.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
JUNE 7, 2016
AI startup Armorway recently announced a round of seed funding that it will use to deliver predictive analytics for security threats.
Tech Republic Security
JUNE 2, 2016
Michael Hayden believes managing vulnerabilities is untenable and consequence management using the Risk Equation is preferable. Read about the equation's components.
Tech Republic Security
JUNE 21, 2016
A report from US network security FireEye recently showed that breaches attributed to China-based groups dropped dramatically over the past two years.
Tech Republic Security
JUNE 9, 2016
Follow these steps to generate and install a self-signed certificate to be used on Apache2.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
JUNE 30, 2016
A Kaspersky Lab reports Android ransomware is booming, quadrupling over the past year alone, shedding light on the growing problem of non-PC ransomware.
Tech Republic Security
JUNE 28, 2016
Security is the top reason developers consider jumping to a new cloud, along with better reliability and a better user experience, according to a new survey by Evans Data.
Tech Republic Security
JUNE 29, 2016
Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.
Tech Republic Security
JUNE 13, 2016
Cybersecurity is a key issue, with digital forensics teams arming organizations against the threat of data breaches and network security. Take our survey and get a free copy of the research report.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Tech Republic Security
JUNE 22, 2016
The DNC and Clinton Foundation were targeted recently by hacker groups. Cybersecurity experts explain why organizations are targeted, the value of data, and how to protect yourself and your business.
Tech Republic Security
JUNE 16, 2016
Those adorable emojis may could lead to serious enterprise headaches. Jack Wallen makes the case for why emojis have no place in the business world.
Tech Republic Security
JUNE 10, 2016
VMware has made a host of announcements to enhance the security of its end user computing products and added new partners to its Mobile Security Alliance.
Tech Republic Security
JUNE 16, 2016
If you passed on the Nylas N1 email app because of security concerns, put those fears aside because PGP encryption is now integrated into the tool.
Speaker: Blackberry, OSS Consultants, & Revenera
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
Tech Republic Security
JUNE 2, 2016
Jack Wallen thinks the "N" in Android N stands for Next Level, because Google provides next-level security improvements.
Tech Republic Security
JUNE 14, 2016
Apple recently announced the new Apple File System (APFS), replacing the decades-old HFS system.
Tech Republic Security
JUNE 7, 2016
See how hackers can unlock smart home door lock codes and more in these proof-of-concept attacks.
Let's personalize your content