Security: Page 20


  • Cognizant hit by Maze ransomware attack, client services disrupted

    Maze is an influential piece of ransomware, and other strains copy its modus operandi: encrypt, steal and publish data.

    By Samantha Schwartz • April 20, 2020
  • 'Ancient' Internet Explorer 6 a ripe cyberattack target this year

    Hacking is a time-consuming activity, requiring trial and error. As a shortcut, "relatively unsophisticated hackers" can download exploits at will, said Cloudflare CTO John Graham-Cumming.

    By Samantha Schwartz • April 20, 2020
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Zero trust isn't a temporary band-aid for remote security

    The coronavirus outbreak and the work-from-home model obliterated a secure perimeter. With business data everywhere, zero trust is what's left.

    By Samantha Schwartz • April 16, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Some hackers are getting lazy

    Palo Alto Networks' Unit 42 found ransomware written by bad actors who failed "to make their lures appear legitimate in any way."

    By Samantha Schwartz • April 14, 2020
  • Image attribution tooltip
    Photo by Josh Appel on Unsplash
    Image attribution tooltip

    Travelex paid the ransom, breach investigation still underway: report

    After discovering the attack, the company took down its websites globally to contain the spread of the virus.

    By Samantha Schwartz • April 9, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yes, developers break cloud security rules. But do companies have adequate policies in place?

    Even though developers are circumventing compliance policies, companies struggle with adopting guidelines altogether.

    By Samantha Schwartz • April 9, 2020
  • Coronavirus chaos ripe for hackers to exploit medical device vulnerabilities

    As crowded hospital emergency rooms and ICUs in major U.S. cities try to keep up with demand for medical services, their networks face a rising threat level from cybercriminals probing for weaknesses. 

    By Greg Slabodkin • April 9, 2020
  • Zoom
    Image attribution tooltip
    Retrieved from Zoom on April 03, 2020
    Image attribution tooltip

    Zoom's no good, very rotten week: What's next in its security plans

    It might be tempting to believe Zoom's flaws were intentionally hidden, it's more likely popularity brought scrutiny — something all prominent technologies eventually bear. 

    By Samantha Schwartz • April 9, 2020
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    FBI warns of a phishing uptick as hackers latch on to coronavirus

    Bad actors are leveraging business email compromise schemes to target "municipalities purchasing protective equipment" and supplies related to the coronavirus response.

    By Samantha Schwartz • April 8, 2020
  • Zoom's privacy woes lead back to end-to-end encryption

    "We did not design the product with the foresight that, in a matter of weeks, every person in the world would suddenly be working, studying, and socializing from home," wrote CEO Eric Yuan. 

    By Samantha Schwartz • April 2, 2020
  • Image attribution tooltip

    Coder

    Image attribution tooltip
    Sponsored by Coder

    Keeping software development secure and productive in a work from home mandate

    Many organizations have implemented remote work policies to protect their employees. As unexpected business disruptions emerge, Coder provides the solution software engineers need.

    April 2, 2020
  • Image attribution tooltip
    "200323-Z-NI803-0587" by New Jersey National Guard is licensed under CC BY-ND 2.0
    Image attribution tooltip

    Is coronavirus putting privacy on hold?

    The pandemic creates a gray area between helping the greater good and loosening data privacy expectations.

    By Samantha Schwartz • April 1, 2020
  • Marriott International, hotel
    Image attribution tooltip
    Retrieved from Marriott on December 03, 2018
    Image attribution tooltip

    Marriott International's latest data breach hits 5.2M guests

    The hotel chain found the intrusion at the end of February and believes it began mid-January, according to the announcement.

    By Samantha Schwartz • March 31, 2020
  • Coronavirus phishing attacks up 667% since February, research finds

    Spring is typically the time of year bad actors send tax-related phishing emails, but this year they are leveraging human fear and health. 

    By Samantha Schwartz • March 26, 2020
  • Ransomware hits healthcare hardest, preys on SMBs

    More attacks are moving past locking systems to breaching victims' data. And while restoring systems, targets may unintentionally wipe forensic evidence determining if data was stolen. 

    By Samantha Schwartz • March 25, 2020
  • Image attribution tooltip
    DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
    Image attribution tooltip

    As Zoom meetings surge, beware digital gate-crashers

    The security of a video conference call extends beyond keeping bad actors from crashing it.

    By Samantha Schwartz • March 24, 2020
  • This transmission electron microscope image shows SARS-CoV-2, the virus that causes COVID-19, isolated from a patient in the U.S.
    Image attribution tooltip
    National Institute of Allergy and Infectious Diseases. (2020). "Novel Coronavirus SARS-CoV-2" [Image]. Retrieved from https://www.flickr.com/photos/nihgov/49565892277/in/album-72157713108522106/.
    Image attribution tooltip

    Report: Medical company set to aid coronavirus response struck by ransomware

    A U.K.-based medical research firm discovered an attack and restored systems, but the attackers still published stolen data. 

    By Samantha Schwartz • March 23, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Everyone wants to be more secure —​ as long as it isn't an inconvenience

    Apply that logic for CIOs and IT leaders, except the stumbling block revolves around revenue, or a lack thereof. 

    By Marc Mazur • March 19, 2020
  • An illustration of cyber security, showing a padlock over a circuit board.
    Image attribution tooltip
    Getty
    Image attribution tooltip

    2 cybersecurity considerations for a remote workforce

    Companies that already have remote workers — whether a handful or a few thousand — know the associated risks.

    By Samantha Schwartz • March 19, 2020
  • A picture of the exterior of the US Department of Health and Human Services. In front of the building is a black sign designating the building's name.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS suffers cyberattack as US deals with coronavirus response

    The intent of the attack was to slow systems, though it was unsuccessful "in a meaningful way," according to the Bloomberg report.

    By Samantha Schwartz • Updated March 16, 2020
  • Sen. Angus King, Rep. Mike Gallagher, co-chairs of the Cyberspace Solarium Commission speaking during the report release in Washington on March 12, 2020.
    Image attribution tooltip

    Matthew Felling, Communications Director for Senator Angus King

    Image attribution tooltip

    Commission put out a 200-page guide for US cybersecurity: Here are 3 takeaways

    The Cyberspace Solarium Commission spent a year analyzing how industry and government could work together to enhance cybersecurity. Will it make a difference?

    By Samantha Schwartz • March 12, 2020
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Banks engage in self-hacks to keep defenses sharp

    Enlisting teams of hackers to look for vulnerabilities helps banks take their security efforts beyond scanning software.

    By Robert Freedman • March 11, 2020
  • The Capitol building on a rainy D.C. day
    Image attribution tooltip
    E.A. Crunden/CIO Dive
    Image attribution tooltip

    Why the government says industry can't wait for a single cyber catastrophe

    In its forthcoming report, the Cyberspace Solarium Commission consulted with the private sector to prioritize critical infrastructure in anticipation of a cyber Pearl Harbor.

    By Samantha Schwartz • March 10, 2020
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Fragmented security patches prevailing issue for CIOs

    Flaws force inventory management and security to meet at a crossroads. Inventory management is the foundation for maintaining security hygiene and without it, companies could prolong risk.

    By Samantha Schwartz • March 6, 2020
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Confidence in breach response low as privacy fines sink into companies

    On average, organizations experienced seven breaches that required reporting under GDPR, according to research from Ponemon Institute and Experian. 

    By Samantha Schwartz • March 4, 2020