Why cyberinsurance can save your business

The threat of loss of an entire company from a cyberattack is real. Technology and user education help, but not enough. Image: iStock/dpVUE.images Cyberattacks are damaging businesses all over the world, and some are going as far as to shut down in their wakes, leaving employees without jobs. On TechRepublic’s

0 Comments

How to Achieve Collaboration Tool Compliance

Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams. As “work from anywhere” continues its ascent because of the pandemic, the use of collaboration tools such as Zoom, Cisco Webex,

0 Comments

Name That Toon: Before I Go …

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. New year, new … yeah, whatever. Perhaps The Edge’s first cartoon caption contest of 2021 can distract you from matters large and small. We can only hope

0 Comments

Why cybersecurity audits are essential for risk management

Find out what your company could risk by not getting cybersecurity audits. Image: Getty Images/iStockphoto TechRepublic contributing writer Lance Whitney reported in December 2020 that security firm McAfee estimated that cybercrime would cost the world $1 trillion last year. When it comes to cybersecurity, it’s difficult to improve anything if

0 Comments

Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

What’s your attitude to parental controls?

Nobody said parenting was easy, but in the digital age it comes with a whole slew of new challenges. How do parents view the role of parental monitoring in children’s online safety? Experience from my nearly 20 years of being involved in the conversation around child online safety has caused

0 Comments

WhatsApp Delays Controversial ‘Data-Sharing’ Privacy Policy Update By 3 Months

WhatsApp said on Friday that it wouldn’t enforce its recently announced controversial data sharing policy update until May 15. Originally set to go into effect next month on February 8, the three-month delay comes following “a lot of misinformation” about a revision to its privacy policy that allows WhatsApp to

0 Comments

How to check if someone else accessed your Google account

Review your recent Gmail access, browser sign-in history, and Google account activity to make sure no one other than you has used your account. Illustration: Andy Wolber/TechRepublic What’s Hot at TechRepublic Whenever a computer is out of your direct view and control, there’s always a chance that someone other than

0 Comments

Tractors, Pod Ice Cream and Lipstick Awarded CES 2021 Worst in Show

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

NSA Appoints Rob Joyce as Cyber Director

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2020-25533PUBLISHED: 2021-01-15 An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token.

0 Comments