Tag: Security | TechRepublic

Mobile device security policy

PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. This policy can be customized as needed to fit the needs of your organization. From the…

Incident response policy

PURPOSE Every enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network. This policy from TechRepublic Premium provides a foundation from which to start building your specific procedures. From the policy:…

API security becoming C-level cybersecurity concern

With Neosec acquisition, Akamai gains capabilities around API visibility, a security challenge for organizations, many of which have hundreds of integrated applications. The post API security becoming C-level cybersecurity concern appeared first on TechRepublic. This article has been indexed from…

Malware is proliferating, but defenses are stronger: Mandiant

As dwell times drop, and notifications of attack by third parties increase, organizations are getting better at defense while attackers evolve and malware proliferates. The post Malware is proliferating, but defenses are stronger: Mandiant appeared first on TechRepublic. This article…

10 best antivirus software for businesses in 2023

Antivirus software protects your data against cybercriminals, ransomware and malware. Compare the best software now. The post 10 best antivirus software for businesses in 2023 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

Credential harvesting malware appears on deep web

New cloud-focused credential harvester available on encrypted messaging service Telegram is part of a trend of Python scrapers making it easier to bait multiple phishing hooks. The post Credential harvesting malware appears on deep web appeared first on TechRepublic. This…

For cybercriminal mischief, it’s dark web vs deep web

A new report from cyberthreat intelligence company Cybersixgill sees threat actors swarming to digital bazaars to collaborate, buy and sell malware and credentials. The post For cybercriminal mischief, it’s dark web vs deep web appeared first on TechRepublic. This article…

Google Play threats on the dark web are big business

Android infections are also prevalent on the dark web, according to Kaspersky. Learn how to keep your workforce safe from these mobile and BYOD security threats. The post Google Play threats on the dark web are big business appeared first…

Cybersecurity leaders see risk from email attacks, hybrid work

Graymail, phishing, vendor impersonation, and other BECs clogging up security teams’ time. The post Cybersecurity leaders see risk from email attacks, hybrid work appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article:…

Ping Identity launches decentralized identity management

With PingOne Neo, Ping Identity aims to accelerate “speed to trust”, supercharge identity management and put control of a user’s identity in the user’s pocket. The post Ping Identity launches decentralized identity management appeared first on TechRepublic. This article has…

PingIdentity launches decentralized identity management

With PingOne Neo, PingIdentity aims to accelerate “speed to trust”, supercharge identity management and put control of a user’s identity in the user’s pocket. The post PingIdentity launches decentralized identity management appeared first on TechRepublic. This article has been indexed…

Phishing from threat actor TA473 targets US and NATO officials

These phishing campaigns are exploiting a Zimbra vulnerability and affecting internet-facing webmail services. Learn how to protect your organization from this security threat. The post Phishing from threat actor TA473 targets US and NATO officials appeared first on TechRepublic. This…

Company that launched 2FA pioneering AI for digital identity

Joe Burton, CEO of digital identity company Telesign, talks to TechRepublic about how the “fuzzy” realm between statistical analysis and AI can fuel global, fast, accurate identity. The post Company that launched 2FA pioneering AI for digital identity appeared first…

BYOD and personal apps: A recipe for data breaches

Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. The post BYOD and personal apps: A recipe for data breaches appeared first on TechRepublic. This article has been indexed…

Study: Women in cybersecurity feel excluded, disrespected

Feelings of exclusion and being disrespected impacts hiring opportunities and retention for women, according to a new report. The post Study: Women in cybersecurity feel excluded, disrespected appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

Nexus Android malware targets 450 financial applications

Learn how to protect your organization and users from this Android banking trojan. The post Nexus Android malware targets 450 financial applications appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Nexus…

DevSecOps puts security in the software cycle

Addressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. The post DevSecOps puts security in the software cycle appeared first on TechRepublic. This article has been indexed from Security |…

8 best enterprise accounting software for 2023

Enterprise accounting software is designed for large companies and businesses. Here are the top eight enterprise accounting software suites. The post 8 best enterprise accounting software for 2023 appeared first on TechRepublic. This article has been indexed from Security |…

Ransomware gangs’ harassment of victims is increasing

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware gangs’ harassment of victims is increasing appeared first on TechRepublic. This…

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. The post BECs double in 2022,…

New Hiatus malware campaign targets routers

A new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn which router models are primarily targeted and how to protect from this security threat. The post New Hiatus malware campaign…

How internet-facing webcams could put your organization at risk

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. The post How internet-facing webcams could put your organization at risk appeared first on TechRepublic. This…

Become your business’s cybersecurity expert

Learn a wide variety of topics for a lifetime with this eclectic bundle. The post Become your business’s cybersecurity expert appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article: Become your business’s…

This 18-course ethical hacking bundle is under $50

Ethical hacking is a great skill to learn with new cyber threats on the rise. Learn how to fight back with this ethical hacking course bundle. The post This 18-course ethical hacking bundle is under $50 appeared first on TechRepublic.…

Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The post Top 10 open-source security and operational risks of 2023 appeared…

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely. The post 1Password is looking to a password-free future. Here’s why appeared first on TechRepublic. This article has been indexed…

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this…

How to expand your search sources beyond Google and Bing

By exploring lesser known search engines such as WolframAlpha, Mojeek and Gigablast, you will get a wider range of results, customization and privacy options. The post How to expand your search sources beyond Google and Bing appeared first on TechRepublic.…

How to expand your search sources

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options. The post How to expand your search sources appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

Mobile device management: Problems and solutions

Explore the MDM market with the CEO of Kolide to learn its challenges and the possible solutions for enterprises and end users. The post Mobile device management: Problems and solutions appeared first on TechRepublic. This article has been indexed from…

Security warning: Beep malware can evade detection

Find out how Beep malware can evade your security system, what it can do and how to protect your business. The post Security warning: Beep malware can evade detection appeared first on TechRepublic. This article has been indexed from Security…

Security awareness and training policy

This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: SUMMARY A security policy is only as valuable as the knowledge…

Internet and email usage policy

Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all…

Royal ransomware spreads to Linux and VMware ESXi

A new Linux version of Royal ransomware is targeting VMware ESXi virtual machines. Learn more about this security threat and how to protect from it. The post Royal ransomware spreads to Linux and VMware ESXi appeared first on TechRepublic. This…