5 ethics principles big data analysts must follow
Tech Republic Security
JANUARY 2, 2017
We trust big data and its processing far too much, according to Altimeter analysts. Get tips on incorporating ethics into your analytics projects.
Tech Republic Security
JANUARY 2, 2017
We trust big data and its processing far too much, according to Altimeter analysts. Get tips on incorporating ethics into your analytics projects.
Kali Linux
JANUARY 16, 2017
Introducing the KLCP Certification After almost two years in the making, it is with great pride that we announce today our new Kali Linux Professional certification - the first and only official certification program that validates one’s proficiency with the Kali Linux distribution. If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Spinone
JANUARY 29, 2017
FinancesOnline – a popular business review directory where people can compare products, and read customer reviews – has honored Spinbackup with two prestigious awards. As a service with a well-designed and easy to use interface, Spinbackup has received the Great User Experience 2016 certificate for their IT security software category.
The Falcon's View
JANUARY 26, 2017
From my NCS blog post : Despite the rapid growth of DevOps practices throughout various industries, there still seems to be a fair amount of trepidation, particularly among security practitioners and auditors. One of the first concerns that pops up is a blurted out "You can't do DevOps here! It violates separation of duties!" Interestingly, this assertion is generally incorrect and derives from a general misunderstanding about DevOps, automation, and the continuous integration/deployment (CI/CD)
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
NopSec
JANUARY 12, 2017
Each year, NopSec conducts a survey of IT and cybersecurity professionals to glean a snapshot of the current state of vulnerability risk management and the outlook for VRM(Vulnerability Risk Management) in the coming year. This survey lets us take the pulse of security professionals across different types of businesses and at varying levels in their organizations, and provides some benchmarking figures for infosec teams who want to know how the maturity of their VRM programs compare.
Tech Republic Security
JANUARY 4, 2017
Microsoft appears to be getting ready to address some complaints about Windows 10, as well as holding its hands up to getting too aggressive in its upgrade push.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JANUARY 18, 2017
A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps and 29% of mobile apps are actually tested for vulnerabilities, raising security concerns.
Tech Republic Security
JANUARY 4, 2017
A study by TechRepublic and data firm Affinio reveals the social media communities and influencers talking about IoT, ransomware, bots, and other cybersecurity threats.
Tech Republic Security
JANUARY 18, 2017
Tech professionals don't generally fall for phishing attacks: They know what to look for and when to be suspicious. One new attack, however, is even fooling the experienced.
Tech Republic Security
JANUARY 24, 2017
New research from a group of universities found that specific video and computer vision algorithm software can unlock an Android Pattern Lock in five attempts.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
JANUARY 4, 2017
A new campaign to distribute ransomware known as GoldenEye takes aim at HR departments via fake job applications. Here's how to keep your company safe.
Tech Republic Security
JANUARY 10, 2017
Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know.
Tech Republic Security
JANUARY 11, 2017
A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.
Tech Republic Security
JANUARY 24, 2017
Don't let your smart bulbs and thermostats fall prey to attack by bots. Use these five tactics to secure your IoT devices.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
JANUARY 9, 2017
A slew of MongoDB databases were recently wiped, with attackers demanding Bitcoin payment in exchange for the data, as tracked by Norwegian developer Niall Merrigan and ethical hacker Victor Gevers.
Tech Republic Security
JANUARY 11, 2017
At NAIAS 2017, experts in data management and cybersecurity discussed the risks that come with the 'internet of cars.' Here's what you should know.
Tech Republic Security
JANUARY 6, 2017
Once upon a time, air-gapped computers were impossible to breach. That is no longer the case. Jack Wallen offers security advice for those who deploy such machines.
Tech Republic Security
JANUARY 31, 2017
Budget concerns and a lack of talent are barriers to advancing enterprise security, according to Cisco's 2017 Annual Cybersecurity Report. Here's how you can protect your business.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
JANUARY 20, 2017
A hacked Apple account can be worth a lot to a cybercriminal. Protect yourself by enabling two-factor authentication for your Apple ID.
Tech Republic Security
JANUARY 12, 2017
New World Hackers claimed responsibility for the Dyn botnet attack. One of the group's database experts explains how he attacks networks, what happens to stolen data, and the mindset of a hacker.
Tech Republic Security
JANUARY 11, 2017
Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things.
Tech Republic Security
JANUARY 27, 2017
Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
JANUARY 25, 2017
A recently discovered bug affecting cloud company Dropbox resulted in data that was supposedly deleted years ago being restored back to user accounts.
Tech Republic Security
JANUARY 13, 2017
Password managers are convenient, affordable, and essential to secure your accounts. How do you lock down your sensitive business and personal data?
Tech Republic Security
JANUARY 9, 2017
Securing privacy and data on mobile devices is always a tricky proposition, but with the right combination of settings, apps, and care, iOS users can feel safer.
Tech Republic Security
JANUARY 23, 2017
Deception technology, derived from military and intelligence agencies, is a method of planting decoy endpoints to confuse and slow down attackers. Then you can turn the tables in your favor.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
JANUARY 23, 2017
Open source may help to make software popular, but it is not making it less secure. Here's why.
Tech Republic Security
JANUARY 11, 2017
Microsoft dials back data collection in its flagship OS but one privacy watchdog is still assessing whether the changes go far enough.
Tech Republic Security
JANUARY 4, 2017
By crossing international borders to obtain evidence to take down Dark Web marketplaces, US law-enforcement agencies are raising international ire. A researcher suggests there may be a better way.
Tech Republic Security
JANUARY 19, 2017
Email encryption is a necessity, yet the masses still aren't adopting the technology. Jack Wallen offers a solution to this urgent security problem.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Let's personalize your content