This article has been indexed from Security | TechRepublic Maintaining security across remote endpoints and ensuring that remote employees comply with new controls are two vexing issues for IT professionals, says Workspot. The post Security, employee compliance biggest challenges when…
Category: Security | TechRepublic
Visa breaks down $9 billion investment in security, fraud initiatives
This article has been indexed from Security | TechRepublic In an increasingly digital-first world, the credit card company is using a multi-layered security approach to enable safe transactions. The post Visa breaks down $9 billion investment in security, fraud initiatives…
Cybersecurity pros spend hours on issues that should have been prevented
This article has been indexed from Security | TechRepublic Security staffers can spend more than five hours addressing security flaws that occurred during the application development cycle, says Invicti. The post Cybersecurity pros spend hours on issues that should have…
Half of global CISOs feel their organization is unprepared to deal with cyberattacks
This article has been indexed from Security | TechRepublic Human error is considered by IT executives to be the biggest vulnerability for organizations in the year ahead. The post Half of global CISOs feel their organization is unprepared to deal…
Kaspersky report identifies new ransomware trends for 2022
This article has been indexed from Security | TechRepublic Ransomware is probably the type of cybercrime that has made headlines the most in 2021, and 2022 seems to follow that trend. Yet it is still evolving, and new ransomware seems…
Bitdefender vs McAfee: Compare EDR software
This article has been indexed from Security | TechRepublic When you’re choosing EDR software for your business, see how the features of Bitdefender and McAfee compare. The post Bitdefender vs McAfee: Compare EDR software appeared first on TechRepublic. Read the…
Microsoft Defender vs CrowdStrike: Compare EDR software
This article has been indexed from Security | TechRepublic Microsoft Defender and CrowdStrike provide robust endpoint protection software, but one of them comes out consistently superior. See how the features of these EDR tools compare. The post Microsoft Defender vs…
Delve into cybersecurity with this two-part training bundle
This article has been indexed from Security | TechRepublic You can learn from more than 90 self-paced certification training courses, as well as protect yourself with a lifetime VPN license. The post Delve into cybersecurity with this two-part training bundle…
Microsoft Defender vs CrowdStrike: EDR software comparison
This article has been indexed from Security | TechRepublic Microsoft Defender and CrowdStrike provide robust endpoint protection software, but one of them comes out consistently superior. See how the features of these EDR tools compare. The post Microsoft Defender vs…
Top 5 things about zero-trust security that you need to know
This article has been indexed from Security | TechRepublic If malicious actors are already on your network, then typical cybersecurity measures aren’t enough. Learn how to further protect your organization’s data with these five facts about zero-trust security from Tom…
Cylance vs CrowdStrike: EDR software comparison
This article has been indexed from Security | TechRepublic See what features you can expect from Cylance and CrowdStrike to choose the EDR solution that is ideal for your business. The post Cylance vs CrowdStrike: EDR software comparison appeared first…
Start a new career in ethical hacking with these 18 training courses
This article has been indexed from Security | TechRepublic You can have a great career helping companies secure their data by becoming a white hat hacker. Try this training to start a fun new career. The post Start a new…
How password fatigue can cost organizations time, money and mental energy
This article has been indexed from Security | TechRepublic On average, companies lose $480 worth of productivity per employee per year due to the time spent dealing with password problems, says Beyond Identity. The post How password fatigue can cost…
Ransomware: How executives should prepare given the current threat landscape
This article has been indexed from Security | TechRepublic As the number of ransomware attacks continue to increase, the response at C-level must be swift and decisive. The post Ransomware: How executives should prepare given the current threat landscape appeared…
Why you need to add a trust and safety officer to the leadership team
This article has been indexed from Security | TechRepublic Companies need one person in charge of creating a consistent user experience that is strong on safety and trust. The post Why you need to add a trust and safety officer…
Protecting payments in an era of deepfakes and advanced AI
This article has been indexed from Security | TechRepublic In our digital age, you need to protect your business against advanced fraud techniques. Here’s how. The post Protecting payments in an era of deepfakes and advanced AI appeared first on…
As important as bulletproof vests: Yubico sends 20,000 keys to Ukrainian government and energy agencies
This article has been indexed from Security | TechRepublic Security key company and local identity management firm replace passwords with security keys to strengthen cybersecurity defenses. The post As important as bulletproof vests: Yubico sends 20,000 keys to Ukrainian government…
Hackers have carried out over 65,000 attacks through Windows’ Print Spooler exploit
This article has been indexed from Security | TechRepublic A number of vulnerabilities within the printing application has led to a string of cyberattacks from all over the world. The post Hackers have carried out over 65,000 attacks through Windows’…
Many security executives say they’re unprepared for the threats that lie ahead
This article has been indexed from Security | TechRepublic Security officers surveyed by ThoughtLab expect an increase in attacks over the next two years from cybercriminals and nation-states using social engineering and ransomware. The post Many security executives say they’re…
Credit card skimming services make it easy for low-level cybercriminals to join the game
This article has been indexed from Security | TechRepublic Credit card skimming just became much easier for cybercriminals, who can now buy ready-to-go skimming services online. Read more about this threat and how to detect it on merchant sites. The…
SANS 2022 Cloud Security Survey
This article has been indexed from Security | TechRepublic Over the past several years, we have seen more and more examples of vulnerabilities in cloud assets, cloud service provider outages, sensitive data disclosure, and breaches involving the use of public…
2022 Cyber Defenders Playbook
This article has been indexed from Security | TechRepublic You’ve probably encountered numerous threat intelligence reports outlining top attack campaigns in the past year. These reports are helpful in that they provide insight into common attacker behaviors and methods, but…
Webinar Optimizing Your Azure Sentinel Platform
This article has been indexed from Security | TechRepublic Organizations with investments in Azure are naturally looking to integrate Azure Sentinel and customize it for their specific needs. But those with complex, hybrid environments or with large volumes of data…
A Complete Guide to Modernizing Your Security Operations Center
This article has been indexed from Security | TechRepublic Having a security operations center (SOC) is no longer a privilege of large organizations. With growing cyber attacks and a changing technology landscape, all companies are now beginning to understand the…
ForgeRock vs Okta: Compare IAM software
This article has been indexed from Security | TechRepublic As more companies rely on remote access for employees, there is a greater need for strong identity access management software. Read this feature comparison of two top IAM solutions: ForgeRock and…
Kaspersky uncovers fileless malware inside Windows event logs
This article has been indexed from Security | TechRepublic The cybersecurity company says this is the first time they have seen this type of malware hiding method. The post Kaspersky uncovers fileless malware inside Windows event logs appeared first on…
FBI: $43 billion in losses are due to Business Email Compromise fraud between 2016 and 2021
This article has been indexed from Security | TechRepublic BEC is a growing type of cybercrime that generates billions in losses every year. It also involves cryptocurrency more and more, providing an additional layer of anonymity to the cybercriminals. The…
One year removed from the Colonial Pipeline attack, what have we learned?
This article has been indexed from Security | TechRepublic Several businesses in critical infrastructure were forced to confront some hard truths in the wake of the 2021 ransomware attack. The post One year removed from the Colonial Pipeline attack, what…
Microsoft Defender vs Carbon Black: EDR software comparison
This article has been indexed from Security | TechRepublic Microsoft Defender for Endpoint and VMware Carbon Black Endpoint are leading endpoint detection and and response security solutions. See how these EDR tools compare. The post Microsoft Defender vs Carbon Black:…
How Microsoft will publish info to comply with executive order on software bill of materials
This article has been indexed from Security | TechRepublic It turns out that security depends on knowing where you code comes from. The post How Microsoft will publish info to comply with executive order on software bill of materials appeared…
How to secure your internet activity on iOS devices
This article has been indexed from Security | TechRepublic Learn about the on-device and network security options available to you in order to supercharge your internet security when browsing the web and using apps on iOS. The post How to…
Cyberespionage: New Mustang Panda campaign targets Europe
This article has been indexed from Security | TechRepublic A cyberespionage threat actor dubbed Mustang Panda hits Europe with a new attack campaign. Read more about it and how to protect yourself from it. The post Cyberespionage: New Mustang Panda…
Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone
This article has been indexed from Security | TechRepublic Adopting a new authentication method from the FIDO Alliance, the three major OS vendors will let you use encrypted credentials stored on your phone to automatically sign you into your online…
How to use KDE Plasma’s Konsole SSH plugin
This article has been indexed from Security | TechRepublic Looking for an incredibly easy tool to manage your SSH connections? KDE’s terminal application has a handy trick up its sleeve. The post How to use KDE Plasma’s Konsole SSH plugin…
CrowdStrike vs FireEye: Compare EDR software
This article has been indexed from Security | TechRepublic See what features you can expect from CrowdStrike and FireEye to decide which EDR solution is right for you. The post CrowdStrike vs FireEye: Compare EDR software appeared first on TechRepublic.…
Check Point vs Palo Alto: Comparing EDR software
This article has been indexed from Security | TechRepublic Check Point and Palo Alto are providers of effective endpoint detection and response tools to allow you to surpass detection-based cyber defense and improve your organization’s ability to manage cybersecurity risk.…
How to manage your Alexa voice recordings and privacy
This article has been indexed from Security | TechRepublic You can view and delete your past Alexa recordings to preserve your privacy. Lance Whitney shows you how. The post How to manage your Alexa voice recordings and privacy appeared first…