Security: Page 21


  • Banking trojan resurfaces targeting JPMorgan, Capital One

    There are "definitely more credentials" floating around the dark web currently because businesses are largely using remote desktop protocol for database access, said Justin Heard, security engineer at Nuspire.

    By Samantha Schwartz • June 17, 2020
  • Sublimits: What execs get wrong about cyber coverage

    Ambiguities and uncertainties can delay adoption or wreak havoc when coverage is needed.

    By Samantha Schwartz • June 16, 2020
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Manufacturers, service providers primary targets of Q1 ransomware incidents

    In Q2, cybercriminals are ramping up phishing schemes and other tactics that seize on "the opportunities presented by the pandemic."

    By Samantha Schwartz • June 11, 2020
  • Honda resumes most operations after cyberattack

    The malware spread throughout the company's networks, though it said no data was compromised.

    By Samantha Schwartz • June 9, 2020
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Where privacy and security 'clash' for remote work

    Shifting remote meant more personal data than ever before was available online, and cybercriminals were aware.

    By Samantha Schwartz • June 9, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Amid layoffs, companies track down and repossess remote employees' data access, devices

    HR, accounting and IT systems all intersect when workers are laid off. Physical offices made retrieval less complicated — "hand me your badge, hand me your laptop."

    By Samantha Schwartz • June 5, 2020
  • Image attribution tooltip
    Taylor McKnight/CIO Dive
    Image attribution tooltip

    What to know about the proposed CCPA rules

    Lingering ambiguities could create loopholes.

    By Samantha Schwartz • Updated July 1, 2020
  • 1 in 4 e-commerce stores lost company data. Some never got it back

    A lackluster data strategy can mean companies miss out on data's potential to boost profits.

    By June 4, 2020
  • Ransomware operators auction stolen data on dark web

    The pressure of an economic downturn caused by COVID-19 is pressuring companies to avoid paying a ransom, a tactic the hackers are preying on.

    By Samantha Schwartz • June 4, 2020
  • California attorney general submits rules proposal as CCPA enforcement nears

    The final proposals rejected certain leeways for circumventing CCPA compliance for more businesses.

    By Samantha Schwartz • June 3, 2020
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    Hurricanes, global tensions shape Forrester's 9 security priorities for 2020

    Security threats include bad actors exploiting flaws in home networks to climate-change induced wildfires that can put key data centers in harm's way.

    By , June 3, 2020
  • Capitol Hill
    Image attribution tooltip
    The image by Андрей Бобровский is licensed under CC BY 3.0
    Image attribution tooltip

    Commission amends cyber recommendations to reflect COVID-19 vulnerabilities

    Four new recommendations are divided between two sections specific to the pandemic: cybersecurity challenges and lessons in cyber preparedness.

    By Samantha Schwartz • June 2, 2020
  • Capital One ordered to disclose third-party analysis of 2019 breach

    The bank argued the business agreement with cybersecurity firm Mandiant made it a protected legal document.

    By Samantha Schwartz • June 1, 2020
  • Tips for managing enterprise security at home, from patches to reboots

    Troubleshooting takes place at a distance. Adequately managing infrastructure requires simplicity. 

    By Samantha Schwartz • May 29, 2020
  • CCPA enforcement is coming. Where are the rules?

    Entire industries might be facing privacy implications given the climate created by the coronavirus.

    By Samantha Schwartz • May 28, 2020
  • Antivirus, firewalls top security solutions for remote work

    Companies using a hybrid model of physical and virtual solutions chose favorites in a hurry this year.

    By Samantha Schwartz • May 27, 2020
  • Apple Google
    Image attribution tooltip
    Retrieved from Apple Newsroom on April 12, 2020
    Image attribution tooltip

    Apple, Google grant 22 countries access to coronavirus contact-tracing software

    Despite the companies' decentralized approach, privacy and security professionals recognize some amount of data will pool into a centralized unit. 

    By Rebecca Pifer , Samantha Schwartz • May 21, 2020
  • Image attribution tooltip
    Photo by Norbert Levajsics on Unsplash
    Image attribution tooltip

    Ancient routers, IoT fridges: Security experts confront the threat landscape at home

    "Our perimeter has moved to a teenager on TikTok," said Jeff Greene, director of the National Cybersecurity Center of Excellence at NIST.

    By Samantha Schwartz • May 21, 2020
  • CCPA enforcement straining manual privacy request processes

    "Do not sell" requests are expected to eventually outpace consumers' demand for data deletion.

    By Samantha Schwartz • May 20, 2020
  • CISO vs. CEO: How executives rate their security posture

    The executives largely agreed they have "very effective" cybersecurity measures, which is an indicator of their confidence.

    By Samantha Schwartz • May 19, 2020
  • Hands on a keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    4 myths cybersecurity experts want busted

    No, malware cannot spread from devices sitting next to each other.

    By Samantha Schwartz • May 19, 2020
  • Report: 4 in 10 employees are using personal apps to share company data

    Most respondents say they understand cyber risk, but there's room for improvement when it comes to mitigation.

    By May 18, 2020
  • DHS warns unpatched VPNs as a top 2020 exploitable flaw

    The work-from-home landscape is stressing enterprise security infrastructure. Vulnerabilities that weren't as risky in an office environment have become a minefield for remote workers.

    By Samantha Schwartz • May 15, 2020
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Zoom security issues place spotlight on other video platforms' privacy troubles

    On Tuesday Cisco issued a clarification regarding its Webex privacy policy. 

    By Samantha Schwartz • May 13, 2020
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Coronavirus-related cyberattacks are like a kicked 'hornet's nest'

    Cyberattacks tied to COVID-19 surface daily in an unmatched volume of threats. Other cyberattacks exploit the circumstances related to the outbreak, namely people logging on from unsecure devices.

    By Samantha Schwartz • May 12, 2020