Security: Page 23


  • Deep Dive

    'Golden bullet' clauses protect CISOs after a breach

    A financial cushion will not shield an executive from public scrutiny, but it can alleviate the burden of blame.

    By Samantha Schwartz • Nov. 18, 2019
  • Capital One removes CISO from role following breach

    Michael Johnson will remain at Capital One as an advisor, focused on the bank's ongoing response to the data breach. The bank is conducting an external search for a new CISO. 

    By Samantha Schwartz • Nov. 7, 2019
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • 0% unemployment rate and 5 other numbers you need to know about cybersecurity

    For professionals considering a job in cybersecurity, the outlook is promising.

    By Samantha Schwartz • Nov. 7, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Q&A

    5 questions with Cisco's CISO

    Steve Martino is tasked with leading Cisco's security strategy, navigating risk in an environment where threats are ever-present and human error is assured. 

    By Naomi Eide • Nov. 7, 2019
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    Don't do the obvious after a ransomware attack, do remain paranoid

    Nearly one-third of adults chose to restart their computers in response to a ransomware attack, according to a Stanford survey, a potentially devastating mistake.  

    By Samantha Schwartz • Nov. 6, 2019
  • Image attribution tooltip
    Courtesy of Gartner
    Image attribution tooltip

    Gartner's strategic tech trends for 2020: Part 2, computing moves to the edge

    AI-based systems are becoming smarter, giving rise to autonomy. Hardware is shrinking, pushing computing to the edge. And the ever-hyped blockchain is finding "practical" applications.

    By Naomi Eide • Nov. 5, 2019
  • Opinion

    How to keep IT security team ahead of alert fatigue

    With e-commerce and cybercrime growing exponentially, alert fatigue has seeped into the digital realm. It's the electronic equivalent of the boy who cried wolf, and it's taking a toll.

    By Samuel Bocetta • Nov. 4, 2019
  • Image attribution tooltip
    Unsplash
    Image attribution tooltip
    Opinion

    Cybersecurity tricks and treats to protect your business

    For CISOs and security professionals, it’s always spooky season. There is nothing make-believe about their arch-enemies —​ cybercriminals — who lurk tirelessly in the shadowy background.

    By Edgardo Artusi • Oct. 31, 2019
  • Image attribution tooltip
    Danielle Ternes for CIO Dive
    Image attribution tooltip
    Deep Dive

    What industry gets wrong about cyber insurance

    Despite common perception, recovery from a cyber event — such as paying a ransom — cannot be decided by a carrier.

    By Samantha Schwartz • Oct. 31, 2019
  • Zappos bucks cash payouts, proposes 10% discount as breach settlement

    Impacted customers received emails this week entitling them to a one-time, 10% discount through the end of the year following the 2012 data breach.

    By Samantha Schwartz • Oct. 18, 2019
  • Image attribution tooltip
    Danielle Ternes for CIO Dive
    Image attribution tooltip
    Deep Dive

    The forgotten ones: Ransomware preys on the resource-poor

    When Brookside Medical Center was hit with ransomware, it refused to pay. The practice was forced to shutter. 

    By Samantha Schwartz • Oct. 17, 2019
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Bracing for 'holy crap,' zero-day exploits

    If malicious code is written with "purpose," any computer can run it.

    By Samantha Schwartz • Oct. 15, 2019
  • Opinion

    3 things CIOs should discuss with the CEO to optimize cybersecurity

    As a business partner, the CIO must provide solutions to cybersecurity concerns and become a champion for working collaboratively with the business.

    By Aaron Shum • Oct. 14, 2019
  • Are retailers doomed for more outages this holiday season?

    J. Crew, Lowe's and Walmart experienced tech glitches or crashes last Black Friday. Experts weigh in on how companies can prevent a repeat this year.

    By Caroline Jansen • Oct. 7, 2019
  • 63% of new hires bring data from old employers. What's the risk?

    To get a leg up when starting a new job some employees bring data from past roles. While enterprising, it threatens business reputation and poses legal, security and financial risks. 

    By Samantha Schwartz • Oct. 3, 2019
  • Zero trust 101 and the art of healthy skepticism

    Where Kubernetes, multifactor authentication and default suspicion intersect.

    By Samantha Schwartz • Oct. 1, 2019
  • Success in DevOps adoption can boost security, research finds

    Puppet research found companies that integrate security into the software development lifecycle are "twice as confident in their security posture."

    By Naomi Eide • Oct. 1, 2019
  • Image attribution tooltip
    DoorDash
    Image attribution tooltip

    DoorDash data breach impacts 4.9M people

    Customers, delivery workers and merchants had names, email and delivery addresses, order history, phone numbers and passwords stolen in the May 4 breach, the company confirmed this week.

    By Alicia Kelso • Sept. 27, 2019
  • Shift to digital business is booming, but are CEOs ignoring associated risk?

    Risk that exists beyond a company's core network and into the cloud is "stuff that CEOs really do not understand," said John Wheeler, senior director analyst at Gartner.

    By Samantha Schwartz • Sept. 27, 2019
  • Fidelity Investments​ translates risk scenarios for the C-suite

    One of the most important pieces of risk management is having a more strategic presentation. Take it to the people who facilitate change.

    By Samantha Schwartz • Sept. 26, 2019
  • Pickles, mayo and data privacy: Jersey Mike's rethinks mobile authentication

    While historically slow to adopt new technologies, restaurants have to rethink mobile systems in an era of heightened privacy concerns.

    By Samantha Schwartz • Sept. 25, 2019
  • Companies miss 99% of IaaS configuration errors, McAfee says

    In some cases, companies aren't even aware the number of IaaS providers they have.

    By Naomi Eide • Sept. 24, 2019
  • Cybersecurity confidence rattled by continued investments, small results

    Only 11% of firms feel a "high degree of confidence" in their cyber resilience, according to Microsoft's annual cyber survey.

    By Samantha Schwartz • Sept. 20, 2019
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Skepticism slows cloud and SaaS adoption

    CISOs perceive on-premise solutions as the safer option. Relinquishing control to SaaS vendors amplifies a sense of paranoia.

    By Samantha Schwartz • Sept. 17, 2019
  • Target tackles identity and access management with zero trust

    When designing an identity ecosystem, companies need to define access by a "need to know" classification reinforced by zero trust, said Jing Zhang-Lee, principal security architect and engineer at Target.

    By Samantha Schwartz • Sept. 17, 2019