June, 2017

article thumbnail

How to make your employees care about cybersecurity: 10 tips

Tech Republic Security

People are the largest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and protect your business.

article thumbnail

Introducing Qualys Project Zero?

Scary Beasts Security

Google's Project Zero team was announced in July 2014. Since then, it has become very well known for publishing offensive security research of exceptional quality. This is especially welcome to defenders at a time where top quality offensive security research is drying up. For most important software targets, it's getting harder to find and exploit bugs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s It Like to Join a Startup’s Executive Team?

Lenny Zeltser

Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?

article thumbnail

Kali Drones, Portable CTF Builds, Raspberry Pi Craziness and More!

Kali Linux

The Kali community is a pretty crazy thing. There are folks all over the world doing interesting things with Kali Linux and far too often, these cool projects get overlooked. Part of the problem is that the community is spread out all over the ’net. We’re continuing to help build the Kali community to help with this problem, but that’s a slightly longer topic.

Hacking 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

More Trending

article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

article thumbnail

The True Cost of A Great Penetration Test

NopSec

If you asked car salesmen from different dealerships the question, “How much does a great car cost?” you’re guaranteed to get different answers and rarely any consistent dollar amount, depending on who they are and the type of person they perceive you to be. “Never buy used American cars. Get Japanese ones. We have some in the lot. Cheap, but it works.

article thumbnail

Qubes OS 4.2 officials released: The best Linux distributions for privacy and security

Penetration Testing

What is Qubes OS? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft... The post Qubes OS 4.2 officials released: The best Linux distributions for privacy and security appeared first on Penetration Testing.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CASL Private Right of Action Delayed (Indefinitely)

Privacy and Cybersecurity Law

The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.

article thumbnail

Cybercrime industry growing rapidly, cybersecurity can't keep up

Tech Republic Security

IBM's Etay Maor believes businesses must rethink their approach to cybercrime and offers suggestions for how they can protect themselves

article thumbnail

Ukraine is a test bed for global cyberattacks that will target major infrastructure

Tech Republic Security

On the ground in Kiev, TechRepublic got a first-hand look at the frontline of a cyberwar that involves alleged Russian state-sponsored hackers, organized crime, and lone-wolf attackers.

167
167
article thumbnail

The 4 types of cybersecurity threats and a formula to fight them

Tech Republic Security

Banks have long been forced to the front lines of cybersecurity and at the 2017 Borderless Cyber event, the CISO of Wells Fargo explained how to pick your battles.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The next generation of cybersecurity professionals is being created by the Girl Scouts

Tech Republic Security

Girl Scouts of the USA is rolling out a set of 18 new cybersecurity badges next year, to teach young women in grades K-12 programming, ethical hacking, and identity theft prevention.

article thumbnail

Free PDF download: Cybersecurity in an IoT and mobile world

Tech Republic Security

This special report from ZDNet and TechRepublic examines the evolving landscape of cybersecurity as mobile and IoT become indispensable tools in the enterprise. Download it as a free PDF ebook.

IoT 164
article thumbnail

How to set up ssh key authentication

Tech Republic Security

Out of the box, secure shell is fairly secure. With the help of ssh key authentication, you can lock down secure shell so that only specific machines can log in. Here's how.

article thumbnail

Want a career in cybersecurity? Here are 10 jobs to explore

Tech Republic Security

There are currently 1 million open cybersecurity jobs worldwide. Here are 10 different career options to investigate in the field.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Top 5: Things to know about ransomware

Tech Republic Security

The fight against ransomware is getting tougher. Here are five basics everyone should know about it.

article thumbnail

Five traits employers should look for when hiring cyber security professionals

Tech Republic Security

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

159
159
article thumbnail

Video: GCS 2017 panel: The future of AI and cybersecurity for business

Tech Republic Security

Are artificial intelligence and machine learning just fancy risk vectors or will they drastically reduce risk across all categories? How are we programming machines to program the next line of defense? Is the singularity near?

article thumbnail

IBM simplifies identity management in the cloud with new offering

Tech Republic Security

IBM's new Identity Connect is an Identity-as-a-Service (IDaaS) solution that aims to make it easier for business users to access their applications.

158
158
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Report: 2.5 million people fell victim to ransomware last year, up 11% from 2016

Tech Republic Security

Ransomware attacks continue to rise worldwide, with the US experiencing the most mobile ransomware threats in the past year, according to a new report from Kaspersky Lab.

article thumbnail

Simply viewing this malicious ad will infect your computer with ransomware

Tech Republic Security

A drive-by malvertising attack known as AdGholas will infect victim machines with the Mole ransomware, without any action taken on behalf of the user.

article thumbnail

How to deter hackers: Follow these digital safety best practices

Tech Republic Security

Nothing guarantees perfect online security. But these checklists will help lock down and protect your digital life, keeping you one step ahead of the bad guys.

157
157
article thumbnail

Ransomware: The most important thing you can do not to be a victim

Tech Republic Security

If you're wondering what important steps you can take to avoid getting taken down by ransomware, Jack Wallen offers up one tip that will go a very long way.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Swapping Linux for Windows in Munich too risky after WannaCry attacks, warn Greens

Tech Republic Security

Munich's Green Party says the recent WannaCry ransomware attacks on Windows machines worldwide highlight the danger of the city abandoning its Linux-based OS.

article thumbnail

Report: 37% of adults at 'serious risk' of being hacked through their IoT devices

Tech Republic Security

Fitness trackers, smart TVs, and children's toys are extremely vulnerable to cyberattacks, but consumers don't know how to protect them, according to a new report from BullGuard.

IoT 156
article thumbnail

Cybersecurity researchers claim every network router at risk of secretly leaking data

Tech Republic Security

Researchers at Ben-Gurion University of the Negev recently demonstrated a hacking technique that utilizes a router's LED to transmit sensitive information.

Risk 156
article thumbnail

Beware that Adobe Flash update on your Android device: It could be malware

Tech Republic Security

A variant of Android malware Marcher has been spotted masquerading as a Flash update. Here's what you need to know about this dangerous, well-disguised threat.

Malware 156
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?