Security: Page 19


  • Capitol Hill
    Image attribution tooltip
    The image by Андрей Бобровский is licensed under CC BY 3.0
    Image attribution tooltip

    Commission amends cyber recommendations to reflect COVID-19 vulnerabilities

    Four new recommendations are divided between two sections specific to the pandemic: cybersecurity challenges and lessons in cyber preparedness.

    By Samantha Schwartz • June 2, 2020
  • Capital One ordered to disclose third-party analysis of 2019 breach

    The bank argued the business agreement with cybersecurity firm Mandiant made it a protected legal document.

    By Samantha Schwartz • June 1, 2020
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Tips for managing enterprise security at home, from patches to reboots

    Troubleshooting takes place at a distance. Adequately managing infrastructure requires simplicity. 

    By Samantha Schwartz • May 29, 2020
  • CCPA enforcement is coming. Where are the rules?

    Entire industries might be facing privacy implications given the climate created by the coronavirus.

    By Samantha Schwartz • May 28, 2020
  • Antivirus, firewalls top security solutions for remote work

    Companies using a hybrid model of physical and virtual solutions chose favorites in a hurry this year.

    By Samantha Schwartz • May 27, 2020
  • Apple Google
    Image attribution tooltip
    Retrieved from Apple Newsroom on April 12, 2020
    Image attribution tooltip

    Apple, Google grant 22 countries access to coronavirus contact-tracing software

    Despite the companies' decentralized approach, privacy and security professionals recognize some amount of data will pool into a centralized unit. 

    By Rebecca Pifer , Samantha Schwartz • May 21, 2020
  • Image attribution tooltip
    Photo by Norbert Levajsics on Unsplash
    Image attribution tooltip

    Ancient routers, IoT fridges: Security experts confront the threat landscape at home

    "Our perimeter has moved to a teenager on TikTok," said Jeff Greene, director of the National Cybersecurity Center of Excellence at NIST.

    By Samantha Schwartz • May 21, 2020
  • CCPA enforcement straining manual privacy request processes

    "Do not sell" requests are expected to eventually outpace consumers' demand for data deletion.

    By Samantha Schwartz • May 20, 2020
  • CISO vs. CEO: How executives rate their security posture

    The executives largely agreed they have "very effective" cybersecurity measures, which is an indicator of their confidence.

    By Samantha Schwartz • May 19, 2020
  • Hands on a keyboard
    Image attribution tooltip
    skynesher/E+ via Getty Images
    Image attribution tooltip

    4 myths cybersecurity experts want busted

    No, malware cannot spread from devices sitting next to each other.

    By Samantha Schwartz • May 19, 2020
  • Report: 4 in 10 employees are using personal apps to share company data

    Most respondents say they understand cyber risk, but there's room for improvement when it comes to mitigation.

    By May 18, 2020
  • DHS warns unpatched VPNs as a top 2020 exploitable flaw

    The work-from-home landscape is stressing enterprise security infrastructure. Vulnerabilities that weren't as risky in an office environment have become a minefield for remote workers.

    By Samantha Schwartz • May 15, 2020
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Zoom security issues place spotlight on other video platforms' privacy troubles

    On Tuesday Cisco issued a clarification regarding its Webex privacy policy. 

    By Samantha Schwartz • May 13, 2020
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Coronavirus-related cyberattacks are like a kicked 'hornet's nest'

    Cyberattacks tied to COVID-19 surface daily in an unmatched volume of threats. Other cyberattacks exploit the circumstances related to the outbreak, namely people logging on from unsecure devices.

    By Samantha Schwartz • May 12, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Cognizant's Maze ransomware attack could cost up to $70M

    After the company disclosed the cyberattack last month, customers began to opt out or suspend Cognizant's "access to their networks," which directly impacted billing, said CEO Brian Humphries.

    By Samantha Schwartz • May 12, 2020
  • Contact tracing in public domain
    Image attribution tooltip
    Adeline Kon for CIO Dive/CIO Dive
    Image attribution tooltip

    Privacy vs. public health: Where contact tracing fits

    Contact tracing walks the line between privacy and responsible tech — a line Apple and Google are exploring.

    By Samantha Schwartz • May 7, 2020
  • The Joel Soloman Federal Building and Courthouse in Chattanooga
    Image attribution tooltip
    The image by Original image from Carol M. Highsmith’s America, Library of Congress collection is licensed under CC BY 2.0
    Image attribution tooltip

    Is there room for Zoom in a virtual courtroom?

    Videoconferencing could undermine traditional courtroom tactics, while also alleviating typical trial pains.

    By Samantha Schwartz • May 6, 2020
  • Image attribution tooltip
    The image by hendricks is licensed under CC BY-SA 3.0
    Image attribution tooltip

    Goldman hires CISO away from Morgan Stanley

    In a case of executive shuffle, Matthew Chung is leaving to join Goldman Sachs in a role vacated in May when Andy Ozment moved to Capital One.

    By Dan Ennis • Updated Oct. 2, 2020
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Malicious domains are floating around the cloud: Here's the threat to companies

    More than 56,200 newly-registered domain names were hosted by AWS, Google Cloud, Microsoft Azure and Alibaba, according to research from Palo Alto Networks' Unit 42.

    By Samantha Schwartz • May 4, 2020
  • Hasty Office 365 deployments wrought with security configuration holes

    With work from home orders, companies rushed cloud-based collaboration service deployments. They could undermine any existing Office 365 security strategy, CISA warns.

    By Samantha Schwartz • May 1, 2020
  • Image attribution tooltip
    MSC
    Image attribution tooltip

    3 years, 3 cyberattacks on major ocean carriers. How can shippers protect themselves?

    Shippers and freight forwarders have a role to play in vetting supply chain partners' risks and keeping their data and cargo safe.

    By Shefali Kapadia • April 30, 2020
  • A collage of remote work situations
    Image attribution tooltip
    Danielle Ternes / CIO Dive and ma_rish via Getty Images/CIO Dive
    Image attribution tooltip
    Column

    The Remote Playbook: Logged on at home, employees are an attacker's dream

    The pandemic makes each remote worker a weak link. Ensuring company-wide adherence to policies can protect sensitive company data. 

    By April 30, 2020
  • With Cognizant attack, Maze ransomware finds its way into IT services supply chain

    Maze encrypts and infiltrates files simultaneously, a signature move of the operators. It holds onto valuable data to later publicly publish online. 

    By Samantha Schwartz • April 23, 2020
  • Who is responsible for securing the home network?

    Companies should not expect all of their employees to be IT people; nor should companies overwhelm those suddenly working from home with a long list of security mandates. 

    By April 23, 2020
  • Opinion

    Why CIOs should make DevSecOps a priority during the COVID-19 crisis

    Companies around the world are increasing capacity and taking the opportunity to look again at their DevOps processes and build in security from the ground up.

    By Samuel Bocetta • April 21, 2020