Press "Enter" to skip to content

टेक्नोलॉजी

5-tips-for-securing-data-when-using-a-personal-mac-for-work
The temptation to use your personal Mac to check work email, confirm a professional appointment, access an employer’s cloud-based app or draft a business document is difficult to resist. Despite the convenience, security risks arise when using your personal Mac for work; for instance, sensitive files and other business best…
massive-evilproxy-phishing-attack-campaign-bypasses-2fa,-targets-top-level-executives
This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Image: ronstik/Adobe Stock New research from Proofpoint exposes a new massive credential phishing attack campaign aimed at top-level executives in more than 100 organizations worldwide. This cybersecurity attack leverages the EvilProxy phishing…
drone-usage-policy
Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer. The list is sure to grow…

IBM Watson: A Cheat Sheet

IBM Watson is designed to make businesses more intelligent, so every member can perform at their best. It first garnered worldwide attention in 2011 as the computerized “brain” that won one million dollars on the TV game show Jeopardy! by beating human contestants. Since then, IBM has widely deployed Watson…

Vendor Comparison: Cloud-Based Integrated Management Services

Cloud computing systems provide a distinct and measurable competitive advantage, and implementing a successful transformation can reap significant long-term benefits for any enterprise. These selection guidelines — and the accompanying file — from TechRepublic Premium will help you establish what your business needs from a cloud-based integrated management system. Once…

Media Disposal Policy

An organization’s data and information possess tremendous value and must always be safeguarded. This policy from TechRepublic Premium helps ensure an organization’s storage media are properly cleansed and sanitized prior to disposal, recycling or donation. From the policy: When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment…

Black Hat USA 2023 Panel: Used Correctly, Generative AI Is A Boon For Cybersecurity

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of Black Hat, focused on the security implications of AI before introducing the main speaker, Maria Markstedter, CEO and founder of Azeria Labs. Moss said that a highlight of the other…

Minimizing Risk Through Proactive Apple Device Management: Addigy

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed workforce, and the diversification of device types. The current regulatory landscape is marked with the emergence of data protection regulations such as the EU’s General Data Protection Regulation and other…

Dependency Confusion Attacks: New Research Into Which Businesses Are At Risk

Image: RareStock/Adobe Stock Application development often requires the integration of third-party or open-source dependencies for efficient functionality and support of other features. However, there is now a reason for security professionals to be concerned about dependencies, as attackers can introduce malicious codes into applications through them. Dependency confusion attacks are…

Downfall Vulnerability Affects Millions Of Intel CPUs With Strong Data Leak Impact

Learn technical details about this newly disclosed security vulnerability, as well as mitigation recommendations from the Google researcher who discovered it. Image: uflypro/Adobe Stock Google researcher Daniel Moghimi discovered a new vulnerability affecting millions of Intel chip models. The vulnerability, dubbed Downfall by Moghimi, enables an attacker to steal sensitive…

How To Create A Dashboard In Looker

on August 11, 2023, 12: 45 PM EDT How to Create a Dashboard in Looker A Looker dashboard is a collection of visualizations, charts and tables that give you an overview of your data. We may be compensated by vendors who appear on this page through methods such as affiliate…

Black Hat 2023 Keynote: Navigating Generative AI In Today's Cybersecurity Landscape

Azaria Labs CEO and founder Maria Markstedter speaks at Black Hat 2023 in Las Vegas on Aug. 10, 2023. Image: Karl Greenberg/TechRepublic At Black Hat 2023, Maria Markstedter, CEO and founder of Azeria Labs, led a keynote on the future of generative AI, the skills needed from the security community…