Security: Page 14


  • CISOs: Approach the board with precision, simplicity

    Executives from PepsiCo, Mandiant and Texas Children's Hospital honed the art of approaching the board. Their techniques leave stakeholders asking, "Do you need anything?"

    By Samantha Schwartz • Oct. 11, 2021
  • Image attribution tooltip
    Adeline Kon/CIO Dive
    Image attribution tooltip
    Column

    The Water Cooler: 4 IT execs on their first incident response steps

    The first step to recovery is planning ahead. But during a crisis, how leadership prioritizes resources and actions from the get-go can determine mitigation.

    By , Oct. 1, 2021
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    With remote work, any employee could be an insider threat. How is CISA mitigating the risk?

    Companies can use a new self-assessment tool from CISA to generate reports on their tolerance and capabilities for preventing insider threats. 

    By Samantha Schwartz • Sept. 30, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    How hackers are making the leap from cloud to the software build processes

    Almost all deployed third-party container applications have known vulnerabilities, research from Palo Alto Networks' Unit 42 found.

    By Samantha Schwartz • Sept. 29, 2021
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    How to build software supply chain transparency

    The Biden administration wants more transparency in the software supply chain. Will private industry join in?

    By Samantha Schwartz • Sept. 22, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by cottonbro from Pexels

    Image attribution tooltip

    Enterprises plan major investments as remote work escalates security risk: report

    Companies are struggling to manage security as the work-from-home model moves from an emergency stopgap to a more permanent environment. 

    By David Jones • Sept. 22, 2021
  • Image attribution tooltip
    Brendan Smialowski / Stringer via Getty Images
    Image attribution tooltip

    Boards rethink incident response playbook as ransomware surges

    Corporate boards are no longer rubber-stamping assurances from CIOs or CISOs but are bringing in outside experts, asking more questions and preparing for the risk of personal liability.

    By David Jones • Sept. 16, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by cottonbro from Pexels

    Image attribution tooltip

    InfoSec teams under pressure to compromise security for productivity: report

    Younger workers are fueling a backlash against corporate security policies designed to protect companies from malicious attacks, a study from HP Wolf Security shows.

    By David Jones • Sept. 9, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Tech CEOs to invest billions in cybersecurity support

    The Biden administration has to strike a balance between honoring big tech's capitalism while pushing it to a higher standard for the sake of national security.

    By Samantha Schwartz • Aug. 26, 2021
  • Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    Men more likely to engage in risky online behavior: report

    Male employees are three times as likely to click on phishing emails, raising questions about gender-based behaviors that open companies to compromise.

    By David Jones • Aug. 24, 2021
  • Woman studying on a computer
    Image attribution tooltip
    ijeab/Getty Images Plus via Getty Images
    Image attribution tooltip

    It's time to bridge the gap between security and development

    More than 80% of developers knowingly release applications with insecure code, but experts say security and development don't have to be at odds.

    By Brian Eastwood • Aug. 10, 2021
  • A woman working from home
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    Decade-old router flaw allows cross-network access, Tenable finds

    Threat actors are actively exploiting the vulnerability, which impacts millions of devices across 11 countries and raises questions about the extent of undiscovered supply chain weaknesses.

    By David Jones • Updated Aug. 10, 2021
  • 1 in 4 security teams report to CIOs, but would benefit from CISO leadership: survey

    Companies get more buy-in for risk assessments and alignment with business goals when cybersecurity reporting centers on the CISO, ISACA found.

    By Samantha Schwartz • July 27, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Engineers need cybersecurity training, too

    Companies will undergo a shift in cyber culture, eventually combining the data engineers and network security professionals use to search for vulnerabilities.

    By Samantha Schwartz • July 22, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    In modernization, security is a barrier and an incentive

    Performance issues, training users on new systems and bandwidth costs represent hurdles to cloud transformation, according to an IBM survey.

    By July 21, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    IT defenses fail to prevent ransomware attacks: report

    While 54% of organizations conduct anti-phishing training, 24% of ransomware attacks used phishing as the point of entry, a Cloudian survey found.

    By July 20, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Want to quickly recover from ransomware? Plan ahead

    Security teams need to understand how the business will work when an attacker limits access to its systems.

    By July 15, 2021
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Kaseya: What's known (and unknown) about the ransomware attack

    The historic ransomware attack against the remote-monitoring provider leaves a number of outstanding questions. 

    By David Jones • July 12, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Kaseya wrestles with service restoration following supply chain attack

    The company is working with federal officials to recover from a ransomware attack that Kaseya said impacted up to 1,500 downstream customers.

    By David Jones • July 6, 2021
  • check, checkbook
    Image attribution tooltip
    Retrieved from Flickr/RikkisRefuge.
    Image attribution tooltip

    Cost of ransomware: CISO exits, staff layoffs and unaccounted losses

    Two-thirds of organizations incurred significant disruptions due to ransomware, a Cybereason survey found.

    By Samantha Schwartz • June 21, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    CISOs, CIOs see heightened mobile security threat amid shift to hybrid

    Mobile devices are difficult to secure because of a combination of untrusted personal apps and data stored on the same device, one security expert said.

    By David Jones • June 16, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip
    Opinion

    Rethinking the perimeter: How to bring confidential data workloads to the public cloud

    Despite its porous nature and generally reactive stance to threats, a network perimeter still deflects the vast majority of attacks.

    By Dan Petrozzo • June 14, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Bad actors hide in everyday IT tools, complicating detection

    Security tools automatically block certain threats, yet there's often a larger intrusion detection teams and services need to weed out.

    By Samantha Schwartz • June 10, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    What to consider before paying a ransom

    Amid rampant attacks, businesses have a choice: pay or suffer.

    By Samantha Schwartz • June 7, 2021
  • Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Compromised cloud costs companies $6.2M annually, study finds

    Attackers heavily target Microsoft 365 and Google Workspace accounts using brute force or phishing attacks, according to Ponemon Institute research.

    By David Jones • May 27, 2021