Security: Page 18
-
Everyone is struggling with cloud security
With rising complexity, 96% of organizations are concerned about their cloud security, a Sophos report found. Misconfigurations are at the heart of the trouble.
By Samantha Schwartz • July 10, 2020 -
'If the public knew:' Ripple20 shows medical device software cyber weakness
Last month’s discovery that Baxter and B. Braun infusion pumps face risk of remote attacks by hackers comes as a medtech effort to track third-party components in devices gains momentum.
By Greg Slabodkin • July 8, 2020 -
Explore the Trendline➔
jariyawat thinsandee via Getty ImagesTrendlineIT Security
Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.
By CIO Dive staff -
The new cybersecurity priorities of 2020
The secure perimeter of offices disappeared. Companies had to scale or buy more technologies for a remote workforce.
By Samantha Schwartz • July 6, 2020 -
Even Pentagon IT leaders want more telework post-pandemic
The Pentagon has been slow to adopt the cloud and famously reliant on floppy disks. Shifting to remote work upended traditional IT security practices.
By Samantha Schwartz • July 2, 2020 -
"200323-Z-NI803-0587" by New Jersey National Guard is licensed under CC BY-ND 2.0
Ransomware vs. healthcare: How the pandemic added to a cyber crisis
Maze was responsible for at least six ransomware attacks this year and NetWalker was responsible for at least five, according to Recorded Future.
By Samantha Schwartz • June 30, 2020 -
Opinion
A Microsoft bug detection breakthrough has its drawbacks: undetected flaws
Although an accuracy level of 99% sounds great, given the scale that Microsoft is working on this still leaves a huge number of bugs misidentified — 3,000 a month, in fact.
By Samuel Bocetta • June 29, 2020 -
Sponsored by Coder
DevSecOps in government: Enabling secure productivity during a pandemic
Security continues to be a core focus for all software tools. You need the right strategy to avoid negatively impacting the quality of the code nor the ability to deliver products quickly.
By Jeff Mironcow • June 29, 2020 -
First came communication platform adoption. Now it's time for strategy
Between technology vision and employee demand, CIOs are confronted with a new challenge: preserving employee well-being.
By Samantha Schwartz • June 26, 2020 -
Going remote, employee productivity hampered by password lockouts, app access
Working through the global crisis highlighted gaps in IT, allowing companies to become more aware of the challenges they face amid disruption.
By Roberto Torres • June 25, 2020 -
Retrieved from Zoom on April 03, 2020
Former Salesforce exec joins Zoom as CISO
As Jason Lee takes over security at Zoom, the company is ending its 90-day security and privacy plan, which it put in place following highly publicized flaws in March.
By Samantha Schwartz • June 25, 2020 -
Businesses to spend more on security as the number, size of cyberattacks grow
Security strategies are changing as COVID-19's disruption threatens an increase in insider threats and challenges identifying the location of malicious activity.
By Samantha Schwartz • June 24, 2020 -
3 healthcare CISOs tackled telehealth at hyper speed — they wish they were faster
Telehealth is a years-long pursuit for healthcare organizations. But like other digital transformation efforts, COVID-19 accelerated it.
By Samantha Schwartz • June 23, 2020 -
Retrieved from Pixabay.
Gartner shrinks infosec spending forecast for 2020, cloud security gets COVID-19 boost
Certain areas of cybersecurity are "supported" by stay-at-home orders, including VPNs and firewalls, endpoint protection platforms, cloud security and secure web gateways.
By Samantha Schwartz • June 19, 2020 -
Retrieved from Zoom on April 03, 2020
Following scrutiny, Zoom enables end-to-end encryption to all users
Available as technical preview, the feature uses 256-bit AES-GCM encryption, the same encryption used by default in meetings.
By Samantha Schwartz • Updated Oct. 27, 2020 -
Banking trojan resurfaces targeting JPMorgan, Capital One
There are "definitely more credentials" floating around the dark web currently because businesses are largely using remote desktop protocol for database access, said Justin Heard, security engineer at Nuspire.
By Samantha Schwartz • June 17, 2020 -
Sublimits: What execs get wrong about cyber coverage
Ambiguities and uncertainties can delay adoption or wreak havoc when coverage is needed.
By Samantha Schwartz • June 16, 2020 -
Manufacturers, service providers primary targets of Q1 ransomware incidents
In Q2, cybercriminals are ramping up phishing schemes and other tactics that seize on "the opportunities presented by the pandemic."
By Samantha Schwartz • June 11, 2020 -
Honda resumes most operations after cyberattack
The malware spread throughout the company's networks, though it said no data was compromised.
By Samantha Schwartz • June 9, 2020 -
Where privacy and security 'clash' for remote work
Shifting remote meant more personal data than ever before was available online, and cybercriminals were aware.
By Samantha Schwartz • June 9, 2020 -
Amid layoffs, companies track down and repossess remote employees' data access, devices
HR, accounting and IT systems all intersect when workers are laid off. Physical offices made retrieval less complicated — "hand me your badge, hand me your laptop."
By Samantha Schwartz • June 5, 2020 -
Ransomware operators auction stolen data on dark web
The pressure of an economic downturn caused by COVID-19 is pressuring companies to avoid paying a ransom, a tactic the hackers are preying on.
By Samantha Schwartz • June 4, 2020 -
What to know about the proposed CCPA rules
Lingering ambiguities could create loopholes.
By Samantha Schwartz • Updated July 1, 2020 -
1 in 4 e-commerce stores lost company data. Some never got it back
A lackluster data strategy can mean companies miss out on data's potential to boost profits.
By Roberto Torres • June 4, 2020 -
California attorney general submits rules proposal as CCPA enforcement nears
The final proposals rejected certain leeways for circumventing CCPA compliance for more businesses.
By Samantha Schwartz • June 3, 2020 -
Hurricanes, global tensions shape Forrester's 9 security priorities for 2020
Security threats include bad actors exploiting flaws in home networks to climate-change induced wildfires that can put key data centers in harm's way.
By Jen A. Miller , Roberto Torres • June 3, 2020