Category: Security | TechRepublic

Zero-trust security: A cheat sheet (free PDF)

Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…

Zero trust security: A cheat sheet (free PDF)

Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a once-safe device can’t be…

CIOs hold greater organizational leadership status

Foundry’s study found the role has been significantly elevated because of the economy, and CIOs are recognized as strategic business partners by their LOB peers. The post CIOs hold greater organizational leadership status appeared first on TechRepublic. This article has…

Get nine ethical hacking courses for just $30

Learn some of today’s most popular attacks and how to mitigate them with The All-in-One Ethical Hacking & Penetration Testing Bundle. The post Get nine ethical hacking courses for just $30 appeared first on TechRepublic. This article has been indexed…

Unphishable mobile MFA through hardware keys

With Azure AD and FIDO security keys, you can make MFA more secure and avoid having to provision certificates on everyone’s phones. The post Unphishable mobile MFA through hardware keys appeared first on TechRepublic. This article has been indexed from…

FBI takes down Hive ransomware group

Working with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate with members. The post FBI takes down Hive ransomware group appeared first on TechRepublic. This article has been indexed…

How to use Microsoft KQL for SIEM insight

Microsoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies in the data haystack. The post How to use Microsoft KQL for SIEM insight appeared first on TechRepublic. This article has…

Securing IoT with Microsoft Defender for IoT sensors

Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post Securing IoT with Microsoft Defender for IoT sensors appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

The risks of 5G security

Unless you’ve been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The post The risks of 5G security appeared first on TechRepublic. This article has been indexed from Security |…

Learn cutting-edge ethical hacking techniques for just $39.99

The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post Learn cutting-edge ethical hacking techniques for just $39.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic…

10 cybersecurity predictions for tech leaders in 2023

From ransomware to third-party vendor security to software-defined perimeters, these cybersecurity topics should be on IT leaders’ radar. The post 10 cybersecurity predictions for tech leaders in 2023 appeared first on TechRepublic. This article has been indexed from Security |…

Get lifetime access to this feature-rich VPN for just $60

The Seed4.me VPN is now on sale for a limited time. The post Get lifetime access to this feature-rich VPN for just $60 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the original article:…

Data Privacy Week 2023: Virtual events and webinars to attend

The National Cybersecurity Alliance’s second annual Data Privacy Week is January 22-28, 2023. Learn how you can participate in virtual events. The post Data Privacy Week 2023: Virtual events and webinars to attend appeared first on TechRepublic. This article has…

Checklist: Securing Windows 10 systems

Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10…

Malware response checklist

Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is…

Kaspersky releases 2023 predictions

A new report from Kaspersky details what their digital forensics and incident response teams predict as the main 2023 threats to corporations and government agencies. Learn more about it. The post Kaspersky releases 2023 predictions appeared first on TechRepublic. This…

Get lifetime access to this powerful backup tool for $59.99

This deal includes full licenses to Genie Timeline Pro 10 for three devices. The post Get lifetime access to this powerful backup tool for $59.99 appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

Secure your email with this top-rated backup service

Mail Backup X is the ultimate solution to protect your email from corruptions and crashes. The post Secure your email with this top-rated backup service appeared first on TechRepublic. This article has been indexed from Security | TechRepublic Read the…

IT email templates: Security alerts

All company communication needs may vary but certain standard template messages can come in handy for IT staff to keep employees up to date on “need to know” informational bulletins. These bulletins may be one-off or regularly scheduled communications to…

As a cybersecurity blade, ChatGPT can cut both ways

The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense. The post As a cybersecurity blade,…

Threat attackers can own your data in just two days

This report shows cybercriminals need only a couple days to access your full corporate network and exfiltrate its data. Read on to learn more. The post Threat attackers can own your data in just two days appeared first on TechRepublic.…

Rise of cloud-delivered malware poses key security challenges

The volume of cloud-based malware tripled in 2022 over the prior year, says Netskope, with 30% of the malicious downloads coming from Microsoft OneDrive. The post Rise of cloud-delivered malware poses key security challenges appeared first on TechRepublic. This article…

Get lifetime access to award-winning cybersecurity training for just $80

With a CyberTraining 365 Online Academy: Lifetime Subscription, you’ll learn to create and maintain effective, up-to-date security measures. The post Get lifetime access to award-winning cybersecurity training for just $80 appeared first on TechRepublic. This article has been indexed from…

Microsoft retracts its report on Mac ransomware

A publication from Microsoft that was taken down January 6 warns about four ransomware families affecting macOS devices. Much of the report closely resembles research published in July by Patrick Wardle. The post Microsoft retracts its report on Mac ransomware…

BCDR Buyer’s Guide For MSPs

When a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and disaster recovery (BCDR) solution to restore data and operations quickly, without sacrificing margin. That means industry-leading recovery technology…

SIRIS Business Continuity and Disaster Recovery

SIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their clients an all-in-one solution that incorporates local backup and recovery with a secure, cloud-based repository and full disaster recovery…

Ransomware attacks are decreasing, but companies remain vulnerable

Only 25% of the organizations surveyed by Delinea were hit by ransomware attacks in 2022, but fewer companies are taking proactive steps to prevent such attacks. The post Ransomware attacks are decreasing, but companies remain vulnerable appeared first on TechRepublic.…

Security risk assessment checklist

Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need to prove prominent or controversial to prove…

Recent 2022 cyberattacks presage a rocky 2023

A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats. The post Recent 2022 cyberattacks presage a…

Cloud email services bolster encryption against hackers

Google, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector attacks from the first half of 2022. The post Cloud email services bolster encryption against hackers appeared first on TechRepublic.…

Machine-Learning Python package compromised in supply chain attack

A nightly build version of a machine-learning framework dependency has been compromised. The package ran malicious code on affected systems and stole data from unsuspecting users. The post Machine-Learning Python package compromised in supply chain attack appeared first on TechRepublic.…