Security: Page 17


  • Image attribution tooltip
    alvarez via Getty Images
    Image attribution tooltip
    Sponsored by Bridgecrew

    Comprehensive DevSecOps includes securing cloud infrastructure

    Teams often overlook emerging security risks. Fortunately, new tools can help find and proactively mitigate those risks before they lead to data breaches.

    Sept. 3, 2020
  • Image attribution tooltip
    Kendall, Industry Dive
    Image attribution tooltip

    Top network services companies leave exposed to the internet

    Gaps in security programs, including a lack of personnel, expertise or resources, amplify the risk of an unsafe service going undetected.

    By Samantha Schwartz • Sept. 2, 2020
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Ransomware attacks 'raising the bar' as cities struggle to respond

    A former FBI special agent in New York walked through a typical ransomware attack with a series of redacted screenshots, as well as the report.

    By Chris Teale • Aug. 31, 2020
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    First half of 2020 led to nearly 800 disclosed vulnerabilities: report

    Microsoft's Patch Tuesday increased to an average of 102.7 fixes a month since January, according to a report from Trend Micro.

    By Samantha Schwartz • Aug. 28, 2020
  • Risk leaders prepare for technology challenges of reentry

    As new conditions unravel, integrating risk management will make sure the processes developed in lockdown are as sustainable as the country emerges from COVID-19.

    By Samantha Schwartz • Aug. 27, 2020
  • Understanding Carnival's ransomware attack, hitting two different data types

    Last week the cruise line disclosed a ransomware attack that impacted employee and customer data. The security divisions can get murky.

    By Samantha Schwartz • Aug. 26, 2020
  • Sink or swim: Companies adopt tech in effort to stay afloat during pandemic, recession

    While new technologies alleviate the burden of rapid adaptation to customer demand, risk is a constant factor.

    By Samantha Schwartz • Aug. 25, 2020
  • Deloitte: Companies turn to cybersecurity, cloud in pandemic response

    Executives care about agility and sustaining operations through disruption. Cloud acts as a backbone, while cybersecurity is a fence.

    By Aug. 24, 2020
  • Coronavirus tests Ohio State, Stanford CISOs as fall semester begins

    CISOs lost visibility when students and staff went home. Since then, they've gained capacity to react faster to security challenges.

    By Samantha Schwartz • Aug. 21, 2020
  • Carnival hit by ransomware, employee and customer data at risk

    If the attack is concluded as negligent and a result of insufficient security protocols, the company could face privacy-related fines from employees and customers. 

    By Samantha Schwartz • Aug. 19, 2020
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Tabletop exercises can exceed $50K, limited to annual testing

    With fewer tabletop exercises, organizations cannot perform a variety of cyberattack scenarios and develop "muscle memory" for responses. 

    By Samantha Schwartz • Aug. 17, 2020
  • Covid, cyberattack, cybersecurity
    Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    COVID-19 is shattering cyberattack records

    The daily inundation of misinformation, misconceptions and misunderstandings has given cybercriminals an endless buffet of cyber-based ammo to iterate their attacks.

    By Samantha Schwartz • Aug. 12, 2020
  • Capital One to pay $80M penalty over 2019 data breach

    In its consent order, the Office of the Comptroller of the Currency said the bank "failed to establish appropriate risk management" and "failed to identify numerous control weaknesses and gaps in the cloud operating environment."

    By Anna Hrushka , Samantha Schwartz • Aug. 6, 2020
  • How confident are security leaders in their ROI?

    Business-aligned leaders are nearly five-times more likely to collaborate with stakeholders on cost, performance and risk reductions than more reactive leaders, according to a Tenable report.

    By Samantha Schwartz • Aug. 5, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Internet disruptions up 45% since January, ThousandEyes finds

    If outages result from massive upticks in traffic, they can ripple through businesses, no matter their connection to the internet or an ISP. 

    By Samantha Schwartz • Aug. 4, 2020
  • Paradigm shift left VPNs, edge security awaiting long-term strategy

    Companies are coming to terms with the reality of securing every employee's network. In some cases, they're unable to. 

    By Samantha Schwartz • July 30, 2020
  • Opinion

    Investing in too many cybersecurity tools could hurt defenses

    While programs, software and tools are essential to any cybersecurity defense plan, these must work in tandem with security educated employees. 

    By Samuel Bocetta • July 30, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    5 charts that show the impact, and cost, of data breaches

    With every day a breach goes undetected or unresolved, costs mount, customers lose patience, and a company earns a reputation of neglect.

    By Samantha Schwartz • July 29, 2020
  • Email is still a hacker's wonderland, they could take or leave Slack

    While attackers linger in email accounts or sell access points, Slack credentials available for sale go ignored. 

    By Samantha Schwartz • July 27, 2020
  • Passwords for everything. Why are they still terrible?

    Passwords are the cockroaches of cybersecurity, yet the methods for managing them don't have to live forever.

    By Samantha Schwartz • July 24, 2020
  • Image attribution tooltip
    Mars Wrigley
    Image attribution tooltip

    The unanticipated security challenge in Mars, Incorporated pivot to remote work

    "I thought we were doing pretty well with our third-party program," said CISO Andrew Stanley. The company experienced "a complete change in the way that technology would be delivered." 

    By Samantha Schwartz • July 21, 2020
  • TikTok header
    Image attribution tooltip
    Retrieved from TikTok on May 27, 2020
    Image attribution tooltip
    Column

    The dilemma of running TikTok on devices with corporate data

    The CIO Dive team discussed the implications of banning personal applications. Here are our thoughts. 

    By Samantha Schwartz , Naomi Eide , July 20, 2020
  • Are businesses covered if their service provider is hit by ransomware?

    The fallout of supply chain-style ransomware attacks are twofold — data encryption and data exfiltration — cyber insurance has to reckon with both. 

    By Samantha Schwartz • July 17, 2020
  • Why anti-phishing exercises could 'alienate' employees in crisis

    Between maintaining business continuity and preserving employee well-being, CISOs had to decide if a pandemic was an appropriate time to test employee cybersecurity awareness.

    By Samantha Schwartz • July 16, 2020
  • CCPA critics warn innovation could lose under the law. What's at stake?

    Proponents say proper preparation allows compliance and growth to coexist.

    By Samantha Schwartz • July 14, 2020