Tag: Security on TechRepublic

5 top 5G trends for 2020

This year will be a big investment year for 5G for many manufacturers and network operators. Find out what the experts predict will happen next.   Advertise on IT Security News. Read the complete article: 5 top 5G trends for…

How to create a Linux user that cannot log in

For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.   Advertise on IT Security News. Read the complete article: How to create a Linux user that cannot…

Google reveals new cloud security features at RSA 2020

Google’s reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features.   Advertise on IT Security News. Read the complete article: Google reveals new cloud security features at RSA…

Summer Olympics is ripe for cyberattacks

Criminals will exploit the confusion and hustle and bustle of the games to their advantage, according to security researcher.   Advertise on IT Security News. Read the complete article: Summer Olympics is ripe for cyberattacks

Three things CISOs need to do differently in 2020

Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent.   Advertise on IT Security News. Read the complete article: Three things CISOs need to do differently in 2020

16 best practices for improving cybersecurity

Cisco’s 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches.   Advertise on IT Security News. Read the complete article: 16 best practices for improving cybersecurity

5 best practices for IIoT project success

Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments.   Advertise on IT Security News. Read the complete article: 5 best practices for IIoT project success

5 free security apps to keep your Mac safe

Mac users, check out these five antivirus software options, which includes one antimalware app that is ideal for SMBs.   Advertise on IT Security News. Read the complete article: 5 free security apps to keep your Mac safe

How Shadow IT could put your organization at risk

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.   Advertise on IT Security News. Read the complete article: How Shadow IT could put your organization at risk

Mac attacks on the rise

Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.   Advertise on IT Security News. Read the complete article: Mac attacks on the rise

Voatz defends blockchain solution for its voting via app

The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.   Advertise on IT Security News. Read the complete article: Voatz defends…

Android facial recognition is more secure than you think

After running real-world tests of Android’s facial recognition on a Pixel 4, Jack Wallen shares his theory of why some people are so concerned about facial recognition.   Advertise on IT Security News. Read the complete article: Android facial recognition…

IoT device security: 5 tips for enterprises

There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.   Advertise on IT Security News. Read the complete article: IoT device security: 5 tips for enterprises

Kubernetes rollouts: 5 security best practices

If you don’t follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.   Advertise on IT Security News. Read the complete article: Kubernetes rollouts: 5 security best practices

How to protect your privacy on an iOS device

Learn how to keep your iOS devices–and your data–secure with these iOS 13 privacy settings and Apple resources.   Advertise on IT Security News. Read the complete article: How to protect your privacy on an iOS device

How Shadow IT could put your organization at risk

Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.   Advertise on IT Security News. Read the complete article: How Shadow IT could put your organization at risk

How to use 7zip to encrypt files

If you need strong command line encryption on Linux, look no further than 7zip.   Advertise on IT Security News. Read the complete article: How to use 7zip to encrypt files