Developers: Why remote work is the new norm

July 17th, 2019|0 Comments

86% of developers said they currently work remotely in some capacity, according to a DigitalOcean report.   Remote work and flexible schedules are the way of life for most global businesses, and developer jobs are heading [...]


July 8th, 2019|0 Comments

THE FUTURE DEPENDS on connectivity. From artificial intelligence and self-driving cars to telemedicine and mixed reality to as yet undreamt technologies, all the things we hope will make our lives easier, safer, and healthier will require high-speed, always-on [...]

Cisco Live 2019: How edge computing makes 5G essential

June 26th, 2019|0 Comments

Enterprise applications are growing the need for 5G, with edge computing creating the need for immediate content. At Cisco Live 2019, TechRepublic's Teena Maddox spoke with Vertiv Corporation's Patrick Quirk about how enterprise applications are growing the need for [...]

What Is 5G?

June 21st, 2019|0 Comments

AT&T, Verizon, and other carriers are starting to launch 5G networks this year. But what exactly is 5G, and how fast is it compared with 4G? Here are the facts we know so far. 5G [...]

What makes employees happy: 3 myths

May 20th, 2019|0 Comments

These five elements increase employee satisfaction, according to a Wrike report (hint: none are ping pong or free beer). Employee happiness should be a business imperative: Research shows that happy employees are better at customer service, and [...]

How to become a connected leader: 4 key factors

May 17th, 2019|0 Comments

In an SAP SAPPHIRE 2019 session, Traci Maddox spoke about the benefits of being a connected leader in today's digitally transforming enterprise. The entire mission, environment, and personality of an organization begins at the top. [...]

The top 10 megatrends transforming businesses

May 8th, 2019|0 Comments

At SAP SAPPHIRE NOW 2019, Svend Wittern discussed the biggest factors changing businesses to date. In today's market, four out of five IT pros believe digital transformation is critical for a business' survival, according to a recent Masergy [...]

Embracing creativity to improve cyber-readiness

April 29th, 2019|0 Comments

How approaching cybersecurity with creativity in mind can lead to better protection from digital threats This Sunday April 21st is World Creativity and Innovation Day, a day to celebrate and encourage creative thinking across all [...]

Why digital disruption is a top risk to businesses

April 24th, 2019|0 Comments

While digital transformations have their risks, these initiatives end up paying off by making operations more efficient and productive, according to Deloitte. Organizations are pouring huge investments into digital technologies to transform their businesses. However, [...]

Blockchain: Top 4 challenges CIOs face

April 1st, 2019|0 Comments

With hype around blockchain fading, organizations are starting to seek out use cases for the technology, according to Gartner. By 2023, blockchain technologies are poised to support the global movement of $2 trillion worth of [...]

Data protection: Top 3 business challenges

March 22nd, 2019|0 Comments

More than a quarter of businesses experienced irreparable data loss in the past year, according to a Dell EMC survey. The amount of data enterprises are collecting and managing is exploding, and with that comes [...]

Top 5 data recovery tips

March 18th, 2019|0 Comments

Losing data can be a scary experience. Tom Merritt offers five helpful tips for creating a data recovery plan. Hard drives die—it happens all the time—but what can you do? You can try to recover [...]

Why SMBs need technology to hit business goals

February 27th, 2019|0 Comments

SMBs find tech necessary for implementing new systems and processes and deploying new products and services, according to a CompTIA report. Technology is essential for the success and function of SMBs, according to a CompTIA [...]

10 ways data and analytics will impact businesses

February 22nd, 2019|0 Comments

Augmented analytics and artificial intelligence are among the top trends in the field that will significantly change businesses in the coming years, according to Gartner. Augmented analytics and artificial intelligence (AI) are among the top [...]

10 soft skills tech pros need to land a job

February 20th, 2019|0 Comments

Conflict management is the most sought after soft skill in today's workforce, according to Udemy. Here are the other skills companies look for. Soft skills are vital for getting hired, as well as getting promoted, [...]

February 18th, 2019|0 Comments

Network recovery advice: Experts weigh in In the old days, you just had redundant everything, and disaster recovery meant switching over. Not so in the world of cloud computing, security nightmares, and virtual everything. Recovering [...]

4 ways your company can avoid a data breach

February 13th, 2019|0 Comments

More than two-thirds (67%) of cybersecurity professionals said they do not have the time and resources to mitigate all security vulnerabilities to avoid a data breach, according to a Wednesday report from Balbix and the [...]

Top 5 ways to avoid notification stress

February 8th, 2019|0 Comments

We get notifications for everything nowadays. While some notifications are helpful, too many can actually be harmful. Tom Merritt offers five tips for keeping your cool when notification stress hits. Notifications: They buzz, they chirp, [...]

Why it’s still worth it to learn Java

February 4th, 2019|0 Comments

Java may be relatively old, but the programming language mainstay can still give developers a leg up on the competition for enterprise jobs. Python and Go may get all of the hype, but Java is still potentially the [...]

3 ways project management will change this year

February 1st, 2019|0 Comments

Project management is become a more generalized skillset, and companies must adapt to that, according to Capterra. Project managers play an increasingly important role at many companies, with demand for these professionals far outstripping supply. These [...]

5 ways to enforce company security

January 28th, 2019|0 Comments

There are several actions companies can take to improve overall employee awareness about security. View the top five below. CIOs ranked cybersecurity as a top goal in 2018, and cybersecurity continues as a key priority [...]

7 ways to accelerate digital transformation success

January 4th, 2019|0 Comments

Strategic digital transformation is moving beyond IT to impact the entire enterprise, modernizing how companies work, compete, and grow in the digital economy, according to Altimeter's annual State of Digital Transformation report, released Thursday. "We're shifting from [...]

Top 5 highest-paying tech jobs of 2019

December 26th, 2018|0 Comments

Cybersecurity engineers will be the highest-paying and most recruited tech job for 2019, according to a Wednesday report from marketplace recruiting platform Scout Exchange. This is not surprising, as 50-90% of all companies depending on industry [...]

10 skills employers need in a data scientist

December 14th, 2018|0 Comments

At this point, nearly every enterprise is looking for skilled data scientists to wade through buckets of information and glean actionable business insights. However, a shortage of professionals in the field, and the unique combination [...]

Tech leaders dominate best CEOs in America list

December 12th, 2018|0 Comments Microsoft's Satya Nadella was named the Best CEO of 2018, according to a Comparably report released on Tuesday. The top CEOs were separated into two lists: CEOs at large companies (more than 500 employees) and CEOs [...]

Networking trends and news: 2018 year in review

December 10th, 2018|0 Comments

Networking is a fairly old subject, but there are still plenty of interesting things happening. Highlights from 2018 include stories about security, 5G, net neutrality, the Linux Foundation, and more. Security and wireless bandwidth were [...]

How to improve data and analytics use at your company: 4 steps

December 7th, 2018|0 Comments Despite the promise data brings to improving business functions, more than 87% of organizations are classified as having low business intelligence (BI) and analytics maturity, according to a Thursday Gartner report. This creates a major [...]

10 tech trends impacting infrastructure and operations in 2019

December 5th, 2018|0 Comments   Infrastructure and operations (I&O) leaders are becoming increasingly involved in the modern day enterprise, and must prepare for a number of impending technological shifts to support digital infrastructure moving into 2019, according to [...]

4 data science certificates to boost your career and salary

December 3rd, 2018|0 Comments Data scientists—named the no. 1 best job in America by Glassdoor for the past three years—are expected to remain in high demand for 2019, as nearly every company requires employees who can effectively analyze data and [...]

IoT and the security challenges that tech companies face

November 30th, 2018|0 Comments

Cisco's Michele Guel, Distinguished Engineer and Chief Security Architect, discusses IoT and how tech enterprises are working to secure the IoT infrastructure. Cisco's Michele Guel spoke with TechRepublic and CNET Senior Producer Dan Patterson [...]

The 10 most in-demand tech jobs of 2019

November 28th, 2018|0 Comments   The tech jobs landscape of 2019 will likely look largely the same as it did in 2018, with roles in software development, cybersecurity, and data science dominating across industries. "Emerging technologies will be [...]

8 strategies to keep legacy systems running

November 26th, 2018|0 Comments

Dependencies on legacy hardware and software are typically the bane of IT, as stakeholders demand continued access to deprecated platforms. Here's how to ease the pain.   While most organizations are moving business operations [...]

Future of IT Work: Can people keep up with innovation?

November 9th, 2018|0 Comments Successful businesses are the those embracing digital change, but many organizations feel like their IT teams can't keep up with the pace of technological change, according AppDynamics' Agents of Transformation Report released on Thursday. In fact, only [...]

Internet of things in 2019: Five predictions

November 7th, 2018|0 Comments   The internet of things (IoT) is not only changing how businesses operate, but also how people live. With the wide availability of sensors, cloud and edge infrastructures, platforms, analytics, and more, IoT technology has evolved [...]

Microsoft may be the world’s largest open source contributor, but developers don’t care–yet

November 5th, 2018|0 Comments Microsoft is the world's biggest open source contributor, at least, as measured by the number of employees actively contributing to open source projects on GitHub. In fact, Microsoft has double the number of open source contributors as [...]

Why your data in the cloud isn’t as secure as you think

November 2nd, 2018|0 Comments Data in the cloud may be more exposed to attacks and breaches than enterprises think, according to a new report from McAfee. The activity of sharing sensitive data in the cloud has increased 53% [...]

How to get security right in digital transformation: 10 best practices

October 31st, 2018|0 Comments As the business world embraces digital transformation, it is simultaneously embracing the power of data and its impact on employees, end users, and customers. However, many organizations are seeking to leverage data without understanding [...]

3 steps to improve the quality of your organization’s data

October 26th, 2018|0 Comments The term garbage-in-garbage-out dates back to the 1950s and 1960s—the earliest days of computing. It was quickly abbreviated to "GIGO" and represented the idea that if you used poor data for your reporting and computing, [...]

How RATs infect computers with malicious software

October 24th, 2018|0 Comments CNET's Dan Patterson interviewed Kevin Mitnick, founder of Mitnick Security Consulting, and Chief Hacking Officer of the security awareness training company KnowBe4, who demonstrates the dangers of RATs (remote access trojans) and how easily it grabs data from [...]

How to excel as an introverted leader: 3 qualities to take advantage of

October 22nd, 2018|0 Comments   A longstanding misconception exists in the enterprise that denotes extroversion and big personalities as keys to success. Outgoing business professionals may have some social advantages over their introverted co-workers, using their outgoing persona [...]

5G technology: A business leader’s guide

October 17th, 2018|0 Comments

It’s still early days for 5G services, but as they’re being trialed and deployed, they’re on track to have a far-reaching impact for both consumers and businesses. This ebook looks at current and future 5G [...]

Hype no more: 56% of enterprises plan to use blockchain by 2020

October 10th, 2018|0 Comments

IoT, AI, and edge computing are among the top technologies that businesses want to implement in the workplace in the next two years, according to a Spiceworks report. Large enterprises are adopting emerging technologies [...]

5 tips to secure your supply chain from cyberattacks

October 8th, 2018|0 Comments

It's nearly impossible to secure supply chains from attacks like the alleged Chinese chip hack that was reported last week. But here are some tips to protect your company.   Last week, a [...]

The top 10 cyberthreats IT security teams are facing right now

October 5th, 2018|0 Comments

Some 70% of organizations experienced a security breach in the past year, according to a report from Cyren and Osterman Research. Despite increased security spending, cyber incidents continue to plague organizations, as 70% of [...]

The 6 most popular cyberattack methods hackers use to attack your business

October 3rd, 2018|0 Comments

Here's how your company can prevent common cybersecurity incidents including malware and social engineering, according to a Positive Technologies report. Cyberattacks show no sign of slowing down this year, according to a Wednesday report from Positive [...]

Defending your company from cyberattack

October 1st, 2018|0 Comments

Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and [...]

How cybersecurity will evolve in a 5G connected world

September 28th, 2018|0 Comments

A panel of cybersecurity and tech professionals gathered at the 2018 AT&T Business Summit to discuss the future of 5G security. As the Internet of Things (IoT) continues to flood the enterprise, business professionals [...]

How the malware landscape is evolving

September 26th, 2018|0 Comments

We still have a massive number of hacks and malware coming in through phishing and older "tricks," says Franc Artes, Architect of Security Business at Cisco. Franc Artes, Architect, Security Business at Cisco, tells [...]

The top 11 phishing email subject lines SMBs should look out for

September 19th, 2018|0 Comments

Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report. Despite growing threats of phishing, ransomware, and more, many small businesses have no employee cybersecurity training program in place, [...]

How to bring a culture of success to your organization: 6 key habits

September 17th, 2018|0 Comments

Creating and maintaining a strong organization is a feat. Follow these practices to make your company a sure-fire success.   Forging an efficient, successful company is a challenge in today's competitive business market. [...]

Why 31% of data breaches lead to employees getting fired

September 14th, 2018|0 Comments

North America is the region where C-Suite leaders are most likely to be blamed for a breach. As data breaches become headline news, the question arises of who will take the blame for the [...]

The secret to successful cybersecurity programs? Training and automation

September 10th, 2018|0 Comments The health of cybersecurity programs have grown stronger in the past year, according to a DomainTools survey released Monday. In the Cybersecurity Report Card, more than 500 cybersecurity professionals were asked to grade the overall health of [...]

77% of IT pros believe their enterprises will be hacked–but almost half aren’t ready for it

September 5th, 2018|0 Comments In a recent survey of IT professionals with cybersecurity decision-making responsibilities, conducted by Kaspersky Lab, 77% of the respondents said their enterprises are likely to be the target of a coordinated cybersecurity attack during the [...]

Network technologies are changing faster than we can manage them

August 27th, 2018|0 Comments

Kentik's Cisco Live survey shows networks are changing faster than they have in decades, and companies are stumbling trying to keep up with the changes.   Software-defined networking (SDN), Network Functions Virtualization (NFV), and 5G: [...]

Why the human factor is an evergreen problem in cybersecurity

August 17th, 2018|0 Comments

Employee errors in business are a critical threat to nearly half of organizations. Here's how they are trying to solve it.   The human factor is a key concern for businesses trying to [...]

Data recovery do’s and don’ts for IT teams

August 15th, 2018|0 Comments

Operational data recovery is often overlooked for disaster recovery, but it's probably more important. If your organization's approach to everyday data recovery is "wing it," you're doing it wrong.   It's easy for IT staffers [...]

Black Hat: Protecting Industrial Control System

August 13th, 2018|0 Comments

Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit [...]

Less than 30% of SMBs have an IT security pro on staff

August 3rd, 2018|0 Comments

While cybersecurity is vital in SMBs, most remain unequipped to handle concerns and threats, according to a recent report.   While SMBs realize they face several security risks, resource constraints keep them from [...]

HP offers hackers $10,000 to find bugs in its printers

August 1st, 2018|0 Comments

HP announced the industry's first printer security bug bounty program to improve IoT security.   On Tuesday, HP announced a bug bounty program that will give hackers and researchers up to $10,000 if they can [...]

How to make your small business unattractive to cyberattackers

July 23rd, 2018|0 Comments

Cybercriminals perceive small businesses to be lucrative targets. Find out why, and what cybersecurity experts suggest to reduce your digital security risks.   Some small-business owners assume that the size of their company [...]

100% of corporate networks ‘highly vulnerable’ to attacks, here’s how to secure yours

July 20th, 2018|0 Comments

Corporate Wi-Fi networks and employee mistakes make all corporate networks vulnerable to attacks from hackers, according to Positive Technologies.   All corporate networks are highly vulnerable to attacks that would give hackers full [...]

Why a bigger security budget won’t prevent an attack: Here’s a better approach

July 18th, 2018|0 Comments

Enterprises must take a risk-based approach to stop cybercriminals, rather than only throwing money at the problem, according to Gartner.   Business growth and digital transformation are introducing new cyberattack vectors in the [...]

How to install MyWebSQL on Ubuntu 16.04

July 6th, 2018|0 Comments

MyWebSQL is a user-friendly, web-based MySQL admin tool. This walk-through explains the simple installation process.   If you use the MySQL database, chances are you're always looking for a better tool to make the administration [...]

5 steps to mitigating wiper malware

June 13th, 2018|0 Comments

Researchers from Cisco's Talos Intelligence Group offer advice on how to thwart wiper malware, which attempts to destroy systems and/or data.   Cisco's Talos Intelligence Group (TIG) has issued a warning. In the white [...]

Net neutrality: A cheat sheet

June 11th, 2018|0 Comments

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.   Let's say you're [...]

How your stolen data ends up on the Dark Web marketplace

June 8th, 2018|0 Comments

Terbium Labs chief research officer Munish Walther-Puri outlined the pathways that hacked data can travel, and who's involved in prevention efforts.   TechRepublic's Dan Patterson talked with Munish Walther-Puri, chief research officer of [...]

Chrome, Firefox iframe exploit can steal Facebook profile info and other personal data

June 4th, 2018|0 Comments

A side-channel attack on CSS could expose your personal data to malicious websites, unless you update your browser immediately.   A pair of independent security researchers has revealed a serious flaw in cascading style sheets [...]

The 6 reasons why we’ve failed to stop botnets

June 1st, 2018|0 Comments

A joint report from the Department of Commerce and the Department of Homeland Security says fighting botnets requires industry and government collaboration.   A joint report issued Wednesday by the Department of Homeland security and [...]

5-year-old IoT attack resurfaces, puts millions of devices at risk

May 29th, 2018|0 Comments   Update: Z-Wave reached out in response and provided additional details about Z-Shave. Most critically, according to Raoul Wijgergangs, VP/GM of Z-Wave for Silicon Labs, and Lars Lydersen, senior director of product security, Silicon Labs, [...]

GDPR: One rule to rule them all – legally

May 25th, 2018|0 Comments

There is a certain similarity between J. R. R. Tolkien’s The Lord of the Rings trilogy and General Data Protection Regulation (GDPR) coming to force tomorrow, May 25 2018. As weird as it may sound, the regulation puts in [...]

3 reasons to start using SSL certificates right now

May 21st, 2018|0 Comments   For many end users, SSL is most commonly associated with the act of online shopping. Particularly the small padlock that appears while attempting to checkout the items stored in your digital shopping cart. [...]

4 tips for making data cleanup easier and more efficient

May 18th, 2018|0 Comments   Dirty data costs the US economy up to $3.1 trillion a year and organizations have been trying to deal with it by using methods like deduplication, normalization, or even removing or correcting broken or incomplete [...]

Critical PGP vulnerability could reveal text of your encrypted business emails

May 14th, 2018|0 Comments

The vulnerability, called EFAIL, is exploitable against encrypted email, including previously transmitted mail, according to researchers. By James Sanders  | May 14, 2018, 5:45 AM PST   Critical unpatched vulnerabilities in widely-used email encryption tools PGP [...]

Top 5: Things to know about fileless attacks

May 2nd, 2018|0 Comments   Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don't require a payload or tricking someone into [...]

RSA 2018: Behind the lines

April 30th, 2018|0 Comments

More than 42,000 people attended last week’s RSA Conference in San Francisco. If you were not in attendance, hopefully you saw the three reports filed by my colleague, Cameron Camp (Untangling the enterprise security mess, Hacking [...]

How to help employees realize their responsibility in keeping a company safe from data breaches

April 26th, 2018|0 Comments TechRepublic's Dan Patterson spoke with Christy Wyatt, CEO of Dtex Systems, on the cavalier attitude many employees have regarding data breaches, despite most being aware of the inevitable dangers. Dan Patterson: A new report by [...]

Protect sensitive data with these five free encryption apps

April 20th, 2018|0 Comments

Protecting customers' personal data is vitally important to the future success of every organization. Encrypting that data with one of these apps is a good place to start. Numerous high-profile events in 2017 and [...]

IT leader’s guide to cyberattack recovery

March 21st, 2018|0 Comments

Cybersecurity prevention efforts shouldn’t overshadow your ability to respond and recover in the event of an attack. This ebook offers advice from security experts on how to recover from a cyberattack with the least amount [...]

How companies can monetize big data with IoT data control

March 14th, 2018|0 Comments

The oil and gas industry, auto manufacturers and more can maximize the value of IoT deployments with IoT data control. A Cisco exec explains how to manage data control and why it's necessary. IoT [...]

Salesforce launches conversational queries with Einstein Analytics

March 12th, 2018|0 Comments

The new capability allows business users to type phrases related to their data and instantly view answers in automatically configured charts. Salesforce's new conversational queries will allow business users to 'have a conversation with [...]

New vulnerability in Exim software allows hackers to gain control of your mail server

March 7th, 2018|0 Comments

The popular mail server software has an off-by-one buffer overflow that can be exploited to run arbitrary code. A critical vulnerability in Exim allows attackers to remotely run arbitrary code without authentication. The vulnerability [...]

GDPR: Regulatory compliance is just the beginning

March 2nd, 2018|0 Comments

Joel Benavides, managing director of global legal services at Box, explains the policies enterprise companies can anticipate with cloud data management after the GDPR. We have just a few months until the GDPR hits. [...]

How to protect Macs from malware threats

February 28th, 2018|0 Comments

Read tips on how to secure Macs from malware, including ransomware, phishing, rootkits, viruses, and more. As malware threats increase in number and frequency, the next big attack could be looming just beyond the [...]

How businesses can keep their employees safe online

February 12th, 2018|0 Comments

From social media to online banking to email, Secure Anchor CEO Eric Cole explains how employee web activity can compromise your company's network. Unfortunately, humans can be a significant threat vector. TechRepublic spoke with [...]

Hackers are now attacking Cisco ASA VPN bug

February 9th, 2018|0 Comments

Cisco researchers are now aware of attempted attacks leveraging a vulnerability in its Adaptive Security Appliance. A major vulnerability affecting Cisco's Adaptive Security Appliance is now under attack by hackers, according to Cisco. Companies [...]

Why it’s important to avoid FUD fatigue and threat rigidity when making security decisions

February 5th, 2018|0 Comments

Crying wolf to elicit a certain response is poor cybersecurity, contributing to a phenomenon called threat rigidity. Here's advice on successfully guiding your organization through a security incident. Relying on Fear, Uncertainty, and Doubt [...]

Here are the ‘most clicked’ phishing email templates that trick victims

January 29th, 2018|0 Comments

Wombat's state of phishing report shows that attack rates remain steady, but there is some good news: User Click rates have dropped. The most successful phishing attacks are now consumer focused, instead of business [...]

How the private sector and US government can work together to defend against cyberattacks

January 26th, 2018|0 Comments

Sharing information about cyberthreats that face both private corporations and the government can benefit both institutions, according to attorney and former CIA case officer Jack Rice. TechRepublic's Dan Patterson spoke to attorney and former [...]

Cybersecurity incidents top the 2018 Allianz Risk Barometer as second largest concern

January 22nd, 2018|0 Comments

Data breaches, malware, and ransomware attacks are now a primary concern for SMBs and enterprise companies, says Allianz cybersecurity chief Jenny Soubra. Cybersecurity incidents now rank as number two on the Allianz Risk Barometer, a [...]

Report: Only 40% of data stored in cloud secured with encryption, key management

January 17th, 2018|0 Comments

Organizations globally lack clear policies around securing data in the cloud, according to Gemalto and the Ponemon Institute. Only 40% of the data stored in the cloud is secured with encryption and key management [...]

Why your next contactless credit card might have a fingerprint scanner built-in

January 9th, 2018|0 Comments

Contactless credit cards that utilize biometrics, like one recently launched by Gemalto, may help prevent identity theft. Building a slide deck, pitch, or presentation? Here are the big takeaways: Gemalto launched a contactless credit [...]

Why cybersecurity in 2018 will be an AI vs. AI slugfest

January 9th, 2018|0 Comments

Cybercriminals will soon rely on machine learning and other AI-based attacks to hammer corporate systems and imitate human behavior, says IBM Security's Caleb Barlow. In 2018, we will see a rise in artificial intelligence-powered [...]

Vocal disguises and impersonations may fool voice recognition authentication

January 2nd, 2018|0 Comments

Research indicates that impersonating a voice can fool voice recognition authentication systems. Multimodal biometric authentication might be a better security option. Pundits predict that biometrics will eventually replace passwords as the preferred method of authenticating users. [...]

Top five emerging cybersecurity trends for 2018

December 27th, 2017|0 Comments

Netwrix sums up the top cybersecurity trends that will define the way organizations develop their IT strategies in the coming year. Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation [...]

The 20 worst passwords of 2017: Did yours make the list?

December 22nd, 2017|0 Comments

Despite all of the year's major hacks, people still can't seem to let passwords like 'admin' and '123456' go. For the fourth consecutive year, "123456" and "password" topped the list of leaked passwords. —SplashData, [...]

Warning: Cyber breaches more likely over holiday break

December 18th, 2017|0 Comments

Some 28% of employees have never received cybersecurity training. Here's how to help them stay safe while on holiday break. Building a slide deck, pitch, or presentation? Here are the big takeaways: 24% of [...]

The evolution of ransomware: Get ready for more advanced social engineering tactics

December 15th, 2017|0 Comments

Prepare your company for more sophisticated, complex, and devastating ransomware attacks in 2018, says Avecto COO Andrew Avanessian. Ransomware became a massive nuisance for enterprises, SMBs, and consumers in 2017—and that threat is not going [...]

99% of office workers threaten their company’s cybersecurity

December 13th, 2017|0 Comments

Minor actions, like reusing passwords, suggest workers may prioritize convenience over enterprise security, a new report said. Virtually all office workers—99%—admit to making at least one action that could threaten a company's cybersecurity, a new [...]

20 must-read TechRepublic downloads about IT jobs, Office tips, security basics, and more

December 8th, 2017|0 Comments

Check out these TechRepublic PDF downloads to read investigative reports, in-depth special features, productivity tips, and career advice. In addition to keeping up with the day-to-day news that business and technology leaders need to [...]

Report: 71% of consumers fear AI will infringe on their privacy

December 6th, 2017|0 Comments

Despite optimism from tech leaders, consumers may not be as excited for AI in their lives, a new study found. Nearly three-fourths of people say they don't want companies to use artificial intelligence (AI) [...]

AWS to increase enterprise security with private endpoint option

November 29th, 2017|0 Comments

The new AWS PrivateLink feature lets SaaS developers build private endpoints to access the service. Amazon Web Services (AWS) will let Software as a Service (SaaS) application developers offer private endpoints, the company announced [...]

Android users: Google is collecting your location data even if location services are off

November 21st, 2017|0 Comments

As long as you're accessing the internet on an Android device, Google can figure out where you are, a new Quartz investigation found. Android phones are collecting users' location information, even when location services [...]

Don’t click that! How to spot an invoice impersonation attack that pretends to be from a coworker

November 10th, 2017|0 Comments

Invoice impersonation attacks are on the rise, attempting to download malware that steals victims' credentials. Finance workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that [...]

Why UN cybercrime chief calls attacks an economic issue

November 3rd, 2017|0 Comments

Companies don't just lose valuable information after experiencing a cyberattack, they lose the public's trust as well. "This impacts people's lives," says the UN's Neil Walsh. There isn't a day that goes by where [...]

3 simple Ways To Protect Your Data

November 1st, 2017|0 Comments

As passwords become easier to hack, IBM Security's Limor Kessem explains three ways your enterprise can protect itself. Passwords are increasingly becoming easier to hack, meaning that companies must take new actions to protect [...]

Microsoft’s October Patch Batch Fixes 62 Flaws

October 30th, 2017|0 Comments

Microsoft on Tuesday released software updates to fix at least 62 security vulnerabilities in Windows, Office and other software. Two of those flaws were detailed publicly before yesterday’s patches were released, and one of them is already being exploited [...]

Shark Tank’s Robert Herjavec: Cybersecurity at work is everyone’s responsibility

October 27th, 2017|0 Comments

The investor and founder of cybersecurity firm Herjavec Group spoke with TechRepublic about the biggest threats facing businesses, and how all employees can get involved in security. Despite the critical nature of cybersecurity, it [...]

Do These 3 Things To Keep Yourself And Your Company Cyber-Secure

October 25th, 2017|0 Comments Jenny Soubra, Head of Cybersecurity for Allianz, explains the steps small and middle market businesses can take to ensure they are prepared to mitigate data breaches, ransomware attacks, and infrastru... Limor Kessem, Executive [...]

Nearly Undetectable Microsoft Office Exploit Installs Malware Without An Email Attachment

October 25th, 2017|0 Comments

Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines with very little means of detection. A newly discovered Microsoft [...]

Malware Campaign Targets Security Researchers With Bogus Cyber Conference Document

October 23rd, 2017|0 Comments

Hackers Group 74 are using fake messages from the Cyber Conflict US conference to infect cybersecurity experts with malware, according to a new report from Cisco Talos.   Cybersecurity workers, beware: A new malicious [...]

Survey Shows Most Workers Misunderstand Cybersecurity: How To Improve Awareness In Your Organization

October 20th, 2017|0 Comments

A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tips will help you improve user cybersecurity awareness. A User Risk Report released by Wombat Security [...]

How To Keep Your WordPress Site Secure

October 18th, 2017|0 Comments

SiteLock president Neill Feather explains simple ways the 74 million websites powered by WordPress can remain secure. Open source software like WordPress has a reputation for beingless secure than closed source, and that's not [...]

How To Protect Your Windows 10 PC From Ransomware With The Fall Creators Update

October 18th, 2017|0 Comments

The Windows 10 Fall Creators Update includes an amazing new feature: Folder protection against ransomware. Here's how to activate this essential security feature. 3 must-have security features in the Windows 10 Fall Creators Update [...]

DHS Orders Federal Agencies To Bolster Cybersecurity With HTTPS, Email Authentication

October 18th, 2017|0 Comments

The US Department of Homeland Security will require federal agencies to use web and email encryption practices to enhance their security posture. On Monday, the US Department of Homeland Security announced a new requirement for federal [...]

Sweeping Wi-Fi Security Flaw Has Left Nearly Every Connected Device At Risk

October 18th, 2017|0 Comments

A WPA2 security flaw known as KRACK breaks down the common security protocol, leaving nearly every Wi-Fi-connected device at risk for data theft or hacking. Nearly all modern, protected Wi-Fi networks and the devices [...]

How To Protect Your Systems From Newly-Discovered Dnsmasq Vulnerabilities

October 13th, 2017|0 Comments

Google recently discovered seven vulnerabilities in DNS software Dnsmasq. Here's how to protect your company's operating systems, IoT, and networking devices. Google recently announced that they have discovered seven new vulnerabilities in the Domain Name System [...]

60% of Americans Want To Live In A Smart City

October 11th, 2017|0 Comments

A CompTIA report shows that 6 in 10 US citizens are interested in living in a smart city, despite concerns about cybersecurity and budgetary constraints. The lure of living in a technologically advanced community [...]

Here’s Google’s Biggest Secret To Not Failing At Security

October 9th, 2017|0 Comments

Security is broken for most enterprises. However, Google shows a better way. Can we all agree that securing the perimeter of an enterprise's IT assets—through firewalls and such—doesn't work and needs a reboot? In [...]

7 Windows 10 Security Features That Could Help Prevent Cyberattacks Against Your Business

September 29th, 2017|0 Comments

With ransomware and spyware on the rise, enterprises need to stay vigilant to protect data from attackers. Here are some native Windows 10 security features that can help. As the cybersecurity threat landscape expands, [...]

5 Critical IT Security Questions Enterprises Need To Answer Now

September 27th, 2017|0 Comments

At Microsoft Envision, Microsoft's president and chief legal officer Brad Smith shared some tips for how companies can gut check their own security strategy. Companies must address cybersecurity, or else "sentence ourselves to a [...]

Nearly 50% Of Organizations Willing To Pay Extra For Security Guarantee From Cloud Vendors

September 25th, 2017|0 Comments

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found. Even though many businesses move to the cloud [...]

Report: 99% of Ransomware Targets Microsoft Products

September 22nd, 2017|0 Comments

A new report from Carbon Black analyzed 1,000 ransomware samples to learn how attackers are using it and how threats are evolving. The explosive growth of ransomware is bad news for Windows users. Some [...]

Cheat Sheet: How To Become A Cybersecurity Pro

September 22nd, 2017|0 Comments

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. As cybercriminals [...]

Using Malware And Infrared Light, Hackers Can Turn A Security Camera Into A Business Spy

September 20th, 2017|0 Comments

The method, identified by researchers at Ben-Gurion University of the Negev, can be used to infiltrate data or perform malicious attacks. Security researchers at Ben-Gurion University of the Negev (BGU) were able to use [...]

How To Design A Network That Meets All Of Your Users’ Needs

September 13th, 2017|0 Comments

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.com When designing a network, organizations must cater to users' [...]

New Report Unveils Top 3 Cybersecurity Threats Facing Business Data

September 8th, 2017|0 Comments

For organizations securing sensitive data, ransomware, insider vulnerabilities, and denial of service attacks are their most-feared threats, according to a new report from the SANS and Infoblox. http://www.techrepublic.com Ransomware, insider threats, and denial of service [...]

Disruptive Cyberattacks Could Hit Energy Infrastructure in US, Europe

September 6th, 2017|0 Comments

A report from Symantec has identified the re-emergence of a hacking group called Dragonfly, which seems to be targeting the energy sector. http://www.techrepublic.com A new "wave of cyberattacks" could be poised to hit the energy [...]

10 Tips For Reducing Insider Security Threats

September 5th, 2017|0 Comments

Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible. A report recently released by the [...]

How One Marketing Company Used A Cloud Solution To Address Project-Related Security Risks

September 1st, 2017|0 Comments

Keeping company data secure can get tricky when collaborating with remote employees and contractors. Here's how AdRoll, a marketing platform provider, addressed that issue using a cloud-based service. http://www.techrepublic.com Security risks are not new in [...]

PlayStation Social Media Accounts Briefly Hacked

August 21st, 2017|0 Comments

Sony became the latest entertainment company to suffer at the fingertips of hackers after their PlayStation social media channels were temporarily hacked on Sunday evening. A group called OurMine claimed credit for the compromise that targeted the [...]

Google pays $10,000 for student’s bug

August 16th, 2017|0 Comments

Google has rewarded a Uruguayan student with $10,000 after he exposed a security flaw that could allow hackers to access sensitive data. Ezequiel Pereira discovered the vulnerability in Google’s App Engine server after changing the [...]

Flash Player is Dead, Long Live Flash Player!

August 7th, 2017|0 Comments

Adobe last week detailed plans to retire its Flash Player software, a cross-platform browser plugin so powerful and so packed with security holes that it has become the favorite target of malware developers. To help eradicate this ubiquitous [...]

Why you should view torrents as a threat

August 2nd, 2017|0 Comments

Despite their popularity among users, torrents are very risky “business”. Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to [...]

Self-Service Food Kiosk Vendor Avanti Hacked

July 10th, 2017|0 Comments

Avanti Markets, a company whose self-service payment kiosks sit beside shelves of snacks and drinks in thousands of corporate breakrooms across America, has suffered of breach of its internal networks in which hackers were able to [...]

Analysis of TeleBots’ cunning backdoor

July 5th, 2017|0 Comments

On the 27th of June 2017, a new cyberattack hit many computer systems in Ukraine, as well as in other countries. That attack was spearheaded by the malware ESET products detect as Diskcoder.C(aka ExPetr, PetrWrap, Petya, or NotPetya). This [...]

Botnets overshadowed by ransomware (in media)

June 7th, 2017|0 Comments

Recently, the much-reported WannaCryptor ransomware attack took the media by storm, receiving considerably more coverage than might have been expected for this type of malware, and overshadowing other internet threats at the same time. More dangerous than [...]

Malicious registry keys: Reflective injection

May 15th, 2017|0 Comments

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both [...]

Beware Google Docs phishing attack

May 4th, 2017|0 Comments

Recently, many people received a phishing email from a address that was attached to a malicious Google doc. It seemed to be targeting journalists, as well as yours truly. Once the link is clicked, [...]

Fake Chrome extensions inject code into web pages

April 28th, 2017|0 Comments

Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected. In countries like Colombia, Peru, Ecuador and Chile, the detection levels for this particular threat have been as high [...]

Scam calls: Can you hear me, mother?

April 26th, 2017|0 Comments

Sandy Powell was a Yorkshire-born comedian who was well known for the catchphrase ‘Can you hear me, mother?’, with which he used to introduce his radio shows. It may not sound particularly amusing nowadays, but [...]

Shoney’s Hit By Apparent Credit Card Breach

April 17th, 2017|0 Comments

It’s Friday, which means it’s time for another episode of “Which Restaurant Chain Got Hacked?” Multiple sources in the financial industry say they’ve traced a pattern of fraud on customer cards indicating that the latest [...]

Alleged Spam King Pyotr Levashov Arrested

April 10th, 2017|0 Comments

Authorities in Spain have arrested a Russian computer programmer thought to be one of the world’s most notorious spam kingpins. Spanish police arrested Pyotr Levashov under an international warrant executed in the city of Barcelona, according to [...]

The right to privacy in the digital era

April 3rd, 2017|0 Comments

Discussions around personal data protection in the European Union have drawn attention to the right of citizens to secure their privacy, a right that has been a constant concern over the years. This is especially [...]

GDPR: A simple explainer

March 24th, 2017|0 Comments

The General Data Protection Regulation (GDPR) is the biggest change in data protection laws for 20 years, and when it comes into effect on May 25th, 2018, it intends to give European citizens back control [...]

ABTA experiences data breach

March 21st, 2017|0 Comments

The Association of British Travel Agents (ABTA) has suffered a major data breach, affecting thousands of customers. As some news providers have observed, it took the UK’s largest holiday and travel association 16 days to [...]

Adobe, Microsoft Push Critical Security Fixes

March 15th, 2017|0 Comments

Adobe and Microsoft each pushed out security updates for their products today. Adobe plugged at least seven security holes in its Flash Player software. Microsoft, which delayed last month’s Patch Tuesday until today, issued an unusually large [...]