Security


  • Tech team professionals collaborate discuss software development strategies in modern office.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    SaaS sprawl weighs down developers

    Maintaining and updating interconnected applications shrinks the bandwidth of IT teams, according to Onymos.

    By Dec. 18, 2024
  • artificial intelligence (AI)
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    More than half of leaders haven’t trained in AI, survey shows

    A lack of training could negatively affect security, privacy and corporate competitiveness, General Assembly says.

    By Carolyn Crist • Dec. 13, 2024
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • An information screen informs travellers that train information is not running due to the global technical outage at Canal Street subway station on July 19, 2024 in New York City.
    Image attribution tooltip
    Adam Gray / Stringer via Getty Images
    Image attribution tooltip

    Executives see another CrowdStrike-level IT outage on the horizon

    IT and business leaders admit to prioritizing security at the expense of service disruption readiness, a PagerDuty report found.

    By Dec. 12, 2024
  • Axiom black header image data and value app
    Image attribution tooltip
    Permission granted by Axiom
    Image attribution tooltip
    Sponsored by 10KMedia

    Logging 2.0 – Why logging needs to be re-imagined in the age of AI

    With Axiom’s centralized datastore, high-scale engineering organizations don’t have to compromise on what to keep, what to keep warm (always querable), or where to store data.

    By Dominic Chapman, Head of Product at Axiom • Dec. 10, 2024
  • Sponsored by Lumos

    Securing identities in 2025 – The future of identity governance

    2025 is near—are you ready for the evolving challenges of identity lifecycle management?

    Dec. 9, 2024
  • An information screen informs travellers that train information is not running due to the global technical outage at Canal Street subway station on July 19, 2024 in New York City.
    Image attribution tooltip
    Adam Gray / Stringer via Getty Images
    Image attribution tooltip

    For IT pros, the CrowdStrike crisis was a ‘call to arms’

    The global outage triggered investments in people, processes and technologies to beef up enterprise resilience, Adaptavist research found.

    By Dec. 5, 2024
  • CrowdStrike office
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    CrowdStrike avoids customer exodus after triggering global IT outage

    The cybersecurity vendor reported $33.9 million in expenses related to the July 19 incident, which caused the company to swing to a loss.

    By Matt Kapko • Nov. 27, 2024
  • growth in business and finance, growing graphs and charts with statistics and digits
    Image attribution tooltip

    stock.adobe.com/Song_about_summer

    Image attribution tooltip
    Sponsored by 10KMedia

    Black Friday 2024: Preparing your e-commerce platform for peak performance

    Performance testing is crucial for eCommerce websites, especially as user expectations continue to rise.

    By Aviv Zohari, Founding Engineer of Groundcover • Nov. 25, 2024
  • View of Microsoft store in NYC, July 2024
    Image attribution tooltip
    Adam Gray via Getty Images
    Image attribution tooltip

    Microsoft unveils resiliency, security enhancements following July global IT outage

    The updates are part of a larger effort at the company to overhaul its internal security culture.

    By David Jones • Nov. 21, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    Easterly to step down from CISA director role on Inauguration Day

    CISA confirmed that political appointees of the Biden administration will also depart the agency as the Trump administration takes over.

    By David Jones • Nov. 18, 2024
  • Google New York City Headquarters, Manhattan
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Google Cloud to mandate MFA for all users in 2025

    The policy change puts the three largest cloud providers — AWS, Microsoft Azure and Google Cloud — in position to have MFA mandates for some or all customers next year.

    By Matt Kapko • Nov. 8, 2024
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Tech executives reassess IT resilience in CrowdStrike outage aftermath

    Nearly all organizations have known operational weaknesses that leave IT systems vulnerable to service interruptions, according to Cockroach Labs.

    By Nov. 7, 2024
  • Republican presidential nominee, former U.S. President Donald Trump and Democratic presidential nominee, U.S. Vice President Kamala Harris debate for the first time during the presidential election campaign at The National Constitution Center on September 10, 2024 in Philadelphia, Pennsylvania.
    Image attribution tooltip
    Win McNamee / Staff via Getty Images
    Image attribution tooltip

    FTC cloud market inquiry remains unresolved as US presidential race enters final stretch

    An ongoing investigation into hyperscaler competition initiated last year by the Federal Trade Commission has largely been overshadowed by AI regulation concerns.

    By Nov. 4, 2024
  • Photograph of a man conducting a seminar on Python computer coding in an open plan work arena.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    5 highest-paying IT certifications in 2024

    An AWS certification earned the top position as employers and employees seek out credentials that verify security, data and cloud skills.

    By Oct. 29, 2024
  • Microsoft CEO Satya Nadella addresses shareholders during Microsoft Shareholders Meeting December 3, 2014 in Bellevue, Washington.
    Image attribution tooltip
    Stephen Brashear / Stringer via Getty Images
    Image attribution tooltip

    Microsoft CEO asked board to cut pay in connection with security overhaul

    Despite the request, Satya Nadella's total compensation in fiscal year 2024 far exceeded 2023 thanks to Microsoft's stock market performance.

    By David Jones • Oct. 25, 2024
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Even small IT failures can cost millions, tech leaders say

    Businesses lose up to $1.9 million per hour from high-impact events like the CrowdStrike outage, according to a New Relic survey.

    By Oct. 25, 2024
  • Concept of technological development of innovation the use of computers in business
    Image attribution tooltip
    Natali_Mis via Getty Images
    Image attribution tooltip

    CISOs, C-suite remain at odds over corporate cyber resilience

    More than a year after the SEC revamped cyber disclosure rules, security and IT executives still struggle to articulate enterprise risk strategies.

    By David Jones • Oct. 8, 2024
  • Graphic design image of a laptop with a lock on the screen.
    Image attribution tooltip
    Permission granted by Electric
    Image attribution tooltip
    Sponsored by Electric

    5 cybersecurity best practices for small to midsize businesses

    Discover the security vulnerabilities putting small to midsize businesses at risk.

    Oct. 7, 2024
  • The entrance to a bank center with revolving doors is pictured.
    Image attribution tooltip
    focusstock via Getty Images
    Image attribution tooltip

    Banking tech alliance drafts enterprise AI adoption guidelines

    The Fintech Open Source Foundation, which now includes Nvidia and Moody’s, outlined LLM risks and control measures to guide deployment in the industry.

    By Oct. 4, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Phishing remains cloud intrusion tactic of choice for threat groups

    The attack mode accounted for one-third of the cloud-related incidents IBM X-Force responded to across a two-year period.

    By Matt Kapko • Oct. 2, 2024
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip
    CrowdStrike outage: Fallout and recovery

    CrowdStrike CEO pushes ‘resilient by design’ framework, promising changes

    The cybersecurity vendor is embracing a new business framework after a defective software update led to one of the largest IT outages in history.

    By Matt Kapko • Sept. 26, 2024
  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip
    CrowdStrike outage: Fallout and recovery

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

    By Matt Kapko • Sept. 25, 2024
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft names deputy CISOs, flushes dead accounts as part of internal security overhaul

    The company released a progress report on efforts to revamp its internal security culture and governance.

    By David Jones • Sept. 23, 2024
  • Binary code of ones and zeros
    Image attribution tooltip
    deberrar/Getty Images via Getty Images
    Image attribution tooltip

    Generative AI raises security concerns among IT leaders

    Executives worry their organization lacks the ability to protect applications and workloads, according to a Flexential survey.

    By Sept. 18, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    Microsoft, working with security partners, pledges better deployment, testing collaboration

    Following a summit with U.S. and European partners, the company is working to build additional resiliency features to prevent a repeat of the historic global IT outage linked to CrowdStrike.

    By David Jones • Sept. 13, 2024