Security | TechRepublic https://www.techrepublic.com News, Tips, and Advice for Technology Professionals Fri, 26 May 2023 20:07:07 +0000 en-US hourly 1 Dell called on NVIDIA hardware for Project Helix generative AI https://www.techrepublic.com/article/dell-project-helix-specifically-trained-generative-ai/ Fri, 26 May 2023 20:06:23 +0000 https://www.techrepublic.com/?p=4098286 On-premises artificial intelligence and specifically trained generative AI are now enterprise trends. Leaders from Dell and NVIDIA and analysts from Forrester Research weigh in.

The post Dell called on NVIDIA hardware for Project Helix generative AI appeared first on TechRepublic.

]]>
How to use Google Smart Lock on iOS to lock down your Google Account https://www.techrepublic.com/article/how-to-use-google-smart-lock-on-ios/ Fri, 26 May 2023 18:35:29 +0000 https://www.techrepublic.com/?p=4100627 Learn how easy it is to sign into your Google Account using the Smart Lock app on iPhone without needing two-factor authentication codes.

The post How to use Google Smart Lock on iOS to lock down your Google Account appeared first on TechRepublic.

]]>
GitLab announces AI-DevSecOps platform GitLab 16 https://www.techrepublic.com/article/gitlab-16-ai-devsecops-platform/ Fri, 26 May 2023 13:38:05 +0000 https://www.techrepublic.com/?p=4100382 GitLab 16 includes more than 55 improvements and new features. Learn about the most notable new technologies in this GitLab platform.

The post GitLab announces AI-DevSecOps platform GitLab 16 appeared first on TechRepublic.

]]>
Launch your cybersecurity career with this ethical hacking bundle https://www.techrepublic.com/article/launch-cybersecurity-career-ethical-hacking-bundle/ Thu, 25 May 2023 22:30:46 +0000 https://www.techrepublic.com/?p=4099917 Score nearly 70% off this essential cybersecurity certification bundle.

The post Launch your cybersecurity career with this ethical hacking bundle appeared first on TechRepublic.

]]>
Experts laud GDPR at five year milestone https://www.techrepublic.com/article/experts-laud-gdpr/ Thu, 25 May 2023 22:23:36 +0000 https://www.techrepublic.com/?p=4099911 The GDPR, in effect for five years on May 25, has influenced the U.S. data privacy laws and is likely to exert itself when AI creates a new set of privacy challenges.

The post Experts laud GDPR at five year milestone appeared first on TechRepublic.

]]>
Microsoft warns of Volt Typhoon, latest salvo in global cyberwar https://www.techrepublic.com/article/volt-typhoon-global-cyberwar/ Thu, 25 May 2023 20:57:35 +0000 https://www.techrepublic.com/?p=4099892 Microsoft published specifics on the Volt Typhoon state-aligned China actor. Experts say raising awareness of threats is critical.

The post Microsoft warns of Volt Typhoon, latest salvo in global cyberwar appeared first on TechRepublic.

]]>
The Essential Guide to Cloud Email Security https://www.techrepublic.com/resource-library/whitepapers/the-essential-guide-to-cloud-email-security/ Thu, 25 May 2023 16:00:00 +0000 https://www.techrepublic.com/resource-library/whitepapers/the-essential-guide-to-cloud-email-security/ As organizations have migrated to cloud-based infrastructure and office platforms like Microsoft 365 and Google Workspace, they’ve seen clear benefits: easier collaboration, greater agility, and lower costs and maintenance related to infrastructure. But for most organizations, the challenge of determining how to keep data protected and employees safe from attacks in a cloud-based environment remains ...

The post The Essential Guide to Cloud Email Security appeared first on TechRepublic.

]]>
CISO Guide to Business Email Compromise https://www.techrepublic.com/resource-library/whitepapers/ciso-guide-to-business-email-compromise/ Thu, 25 May 2023 16:00:00 +0000 https://www.techrepublic.com/resource-library/whitepapers/ciso-guide-to-business-email-compromise/ Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $2.7 billion lost in 2022 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact—typically an executive, co-worker, vendor, or partner—in an effort to steal money or valuable information. Because these emails rarely ...

The post CISO Guide to Business Email Compromise appeared first on TechRepublic.

]]>
From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise https://www.techrepublic.com/resource-library/whitepapers/from-ceo-fraud-to-vendor-fraud-the-shift-to-financial-supply-chain-compromise/ Thu, 25 May 2023 16:00:00 +0000 https://www.techrepublic.com/resource-library/whitepapers/from-ceo-fraud-to-vendor-fraud-the-shift-to-financial-supply-chain-compromise/ Since its initial identification in 2013, business email compromise (BEC) has been dominated by executive impersonation. But over the past few years, attackers have adjusted their strategies—opting to impersonate third party vendors and suppliers instead. In January 2022, the number of attacks impersonating third parties surpassed those impersonating internal employees for the first time. This ...

The post From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise appeared first on TechRepublic.

]]>
Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure https://www.techrepublic.com/resource-library/whitepapers/augmenting-your-microsoft-365-eop-and-mdo-email-security-infrastructure/ Thu, 25 May 2023 16:00:00 +0000 https://www.techrepublic.com/resource-library/whitepapers/augmenting-your-microsoft-365-eop-and-mdo-email-security-infrastructure/ In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of global organizations use Microsoft for email. Whether using Microsoft 365 (M365) or Office 365 (O365), this shift to the cloud has supported an agile and fluid way of doing business for more than 250 million monthly users. This paper reviews ...

The post Augmenting Your Microsoft 365 EOP and MDO Email Security Infrastructure appeared first on TechRepublic.

]]>