April, 2017

article thumbnail

IoT, encryption, and AI lead top security trends for 2017

Tech Republic Security

A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.

article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kali Linux 2017.1 Release

Kali Linux

Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release , which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages , an updated kernel that provides more and better hardware support, as well as a slew of updated tools - but this release has a few more surprises up its sleeve.

article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45

More Trending

article thumbnail

Implementing New York DFS Cybersecurity Regulations: Where Are You in the Process?

NopSec

Here at NopSec, we’ve spoken with a number of financial organizations about where they are in the process of meeting the new New York Department of Financial Services (DFS) cybersecurity regulations that went into effect on March 1, 2017. We’ve learned that different companies are in different stages. Some began their preparations before the March 1st effective date, and others are still in the information gathering stage.

CISO 40
article thumbnail

Kali Linux Repository HTTPS Support

Kali Linux

A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redirector has not. Now that we generate weekly images, secure access to the mirror redirector has become crucial.

article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

SpinOne Data Protection: What Is It?

Spinone

You have probably read about recently updated Google DLP for Gmail and Drive, so now let us introduce you the SpinOne data protection solution that perfectly adds significant value to Google DLP. SpinOne Data Protection for G Suite is a set of security features to protect organizations of any size against data Leak and Loss […] The post SpinOne Data Protection: What Is It?

40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Online shoppers are losing trust in e-commerce, study finds

Tech Republic Security

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.

article thumbnail

Why businesses have the wrong cybersecurity mindset, and how they can fix it

Tech Republic Security

The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.

article thumbnail

How an IoT DDoS warning system helps predict cyberattacks

Tech Republic Security

Cybercriminals are leveraging vulnerable IoT devices to create massive DDoS botnets. Researchers have devised a platform for early warning and analysis of these cyberattacks.

DDOS 162
article thumbnail

5 ways robots are vulnerable to cyberattacks

Tech Republic Security

Robotic devices flooding the IoT market are insecure, according to IOActive researchers. Authentication and privacy issues are some of the cybersecurity risks the researchers found.

IoT 161
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

6 common enterprise cybersecurity threats and how to avoid them

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.

IoT 157
article thumbnail

Report: Cyberespionage now most popular form of cybercrime in many industries

Tech Republic Security

According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

article thumbnail

How one company wants to replace tech show booth babes with STEAM students

Tech Republic Security

The new STEAM-Con Connection offers cybersecurity vendors an alternative to staffing trade show booths with models. Here's how it works.

article thumbnail

Microchip implants help employees access data; experts worry about 'slippery slope' for privacy

Tech Republic Security

A Swedish company offers employees the chance to implant microchips in their hands to simplify access to buildings and carry data. But the implants raise concerns about privacy.

153
153
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Easy ways to make your Android device more secure

Tech Republic Security

Android security doesn't have to be a challenge. Here are a few simple and quick ways to make ensure your device is secure.

152
152
article thumbnail

Win32 is malware? Webroot mistakenly labels Windows as cybersecurity threat

Tech Republic Security

Antivirus provider Webroot recently pushed an updated causing it to read Windows system files as malware and label Facebook a phishing site.

Malware 152
article thumbnail

Robot crime raises thorny legal issues that need addressing now

Tech Republic Security

A legal expert warns that current laws are woefully inadequate to handle crimes committed by robots.

152
152
article thumbnail

4 critical points to consider when receiving cybersecurity and privacy advice

Tech Republic Security

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Mobile devices with Broadcom chipsets may be vulnerable to Wi-Fi hijacking

Tech Republic Security

Learn about new developments to a Wi-Fi vulnerability and how to protect mobile devices from it.

Mobile 148
article thumbnail

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Security

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.

Big data 147
article thumbnail

New training platform uses real-world situations to train cybersecurity experts faster

Tech Republic Security

ISACA's Cybersecurity Nexus Training Platform and Assessment Tool offers on-demand, hands-on training and skills assessment in a live lab environment. Here's how it can help your employees.

article thumbnail

Why big vendors could ruin Blockchain by making it a centralized service

Tech Republic Security

Blockchain has huge potential, but the way it's rolling out may be limiting that potential. Curtailing the use of middlemen is key to Blockchain's success.

140
140
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

7 tips for effectively rolling out emergency patches

Tech Republic Security

Emergency patches can be stressful and time consuming to deploy. Learn some strategies for doing so in the most effective manner.

140
140
article thumbnail

What kinds of people fall prey to identity theft, phishing, and hacks? It's not who you think

Tech Republic Security

Think of an identity theft victim and a few stereotypes probably come to mind, but a new study from CBT Nuggets reveals that the majority of victims are anything but stereotypical.

article thumbnail

Video: Top 5 ways to track data breaches

Tech Republic Security

Has one of your accounts been hacked? The short answer is probably yes. Here are five ways to be sure.

article thumbnail

5 tips for securing your Docker containers

Tech Republic Security

Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.

138
138
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?