Hiring kit: Cybersecurity engineer

PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible... Read more »

How to prevent fork bombs on your Linux development servers

Learn how to protect your Linux server from the fork bomb denial-of-service attack with this video tutorial by Jack Wallen. The post How to prevent fork bombs on your... Read more »

Become your organization’s cybersecurity expert with this $79 bundle

The training covers CISSP, CASP+, CISM, and more. The post Become your organization’s cybersecurity expert with this $79 bundle appeared first on TechRepublic. Read more »

How to secure your GitHub account with two-factor authentication

GitHub wants you to protect your account with the right type of authentication. The post How to secure your GitHub account with two-factor authentication appeared first on TechRepublic. Read more »

DevSecOps puts security in the software cycle

Addressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. The post DevSecOps puts security in the software cycle appeared... Read more »

Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study

Cisco’s just-released 2023 Cybersecurity Index shows companies will invest more in security, but the solution may be a larger tent, not more umbrellas. The post Even after armed with... Read more »

Guidelines for building security policies

PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in... Read more »

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. The post... Read more »

Report: Too many enterprises have shadow IT – unlocked doors with no cameras

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management. The... Read more »

Ransomware gangs’ harassment of victims is increasing

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware... Read more »
Subscribe to our Newsletter