IoT, encryption, and AI lead top security trends for 2017
Tech Republic Security
APRIL 26, 2017
A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.
Tech Republic Security
APRIL 26, 2017
A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.
Schneier on Security
APRIL 11, 2017
Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Kali Linux
APRIL 24, 2017
Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release , which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages , an updated kernel that provides more and better hardware support, as well as a slew of updated tools - but this release has a few more surprises up its sleeve.
Privacy and Cybersecurity Law
APRIL 11, 2017
The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Elie
APRIL 30, 2017
In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.
Dark Reading
APRIL 10, 2017
Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
NopSec
APRIL 19, 2017
Here at NopSec, we’ve spoken with a number of financial organizations about where they are in the process of meeting the new New York Department of Financial Services (DFS) cybersecurity regulations that went into effect on March 1, 2017. We’ve learned that different companies are in different stages. Some began their preparations before the March 1st effective date, and others are still in the information gathering stage.
Kali Linux
APRIL 23, 2017
A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redirector has not. Now that we generate weekly images, secure access to the mirror redirector has become crucial.
Privacy and Cybersecurity Law
APRIL 28, 2017
On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].
Spinone
APRIL 19, 2017
You have probably read about recently updated Google DLP for Gmail and Drive, so now let us introduce you the SpinOne data protection solution that perfectly adds significant value to Google DLP. SpinOne Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss […] The post SpinOne Data Protection: What Is It?
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
APRIL 24, 2017
According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.
Tech Republic Security
APRIL 27, 2017
The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.
Tech Republic Security
APRIL 5, 2017
Cybercriminals are leveraging vulnerable IoT devices to create massive DDoS botnets. Researchers have devised a platform for early warning and analysis of these cyberattacks.
Tech Republic Security
APRIL 11, 2017
Robotic devices flooding the IoT market are insecure, according to IOActive researchers. Authentication and privacy issues are some of the cybersecurity risks the researchers found.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Tech Republic Security
APRIL 11, 2017
At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.
Tech Republic Security
APRIL 27, 2017
According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.
Tech Republic Security
APRIL 28, 2017
The new STEAM-Con Connection offers cybersecurity vendors an alternative to staffing trade show booths with models. Here's how it works.
Tech Republic Security
APRIL 14, 2017
A Swedish company offers employees the chance to implant microchips in their hands to simplify access to buildings and carry data. But the implants raise concerns about privacy.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
APRIL 27, 2017
Android security doesn't have to be a challenge. Here are a few simple and quick ways to make ensure your device is secure.
Tech Republic Security
APRIL 25, 2017
Antivirus provider Webroot recently pushed an updated causing it to read Windows system files as malware and label Facebook a phishing site.
Tech Republic Security
APRIL 21, 2017
A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.
Tech Republic Security
APRIL 21, 2017
Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
APRIL 13, 2017
Learn about new developments to a Wi-Fi vulnerability and how to protect mobile devices from it.
Tech Republic Security
APRIL 10, 2017
MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.
Tech Republic Security
APRIL 18, 2017
ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.
Tech Republic Security
APRIL 4, 2017
Blockchain has huge potential, but the way it's rolling out may be limiting that potential. Curtailing the use of middlemen is key to Blockchain's success.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Tech Republic Security
APRIL 20, 2017
Emergency patches can be stressful and time consuming to deploy. Learn some strategies for doing so in the most effective manner.
Tech Republic Security
APRIL 12, 2017
Think of an identity theft victim and a few stereotypes probably come to mind, but a new study from CBT Nuggets reveals that the majority of victims are anything but stereotypical.
Tech Republic Security
APRIL 4, 2017
Has one of your accounts been hacked? The short answer is probably yes. Here are five ways to be sure.
Tech Republic Security
APRIL 10, 2017
Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.
Speaker: Blackberry, OSS Consultants, & Revenera
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
Let's personalize your content