Security: Page 26


  • Global beer maker hops into cybersecurity

    AB InBev set up an internal cybersecurity unit in Israel to stave off any potential attacks, Reuters reports.

    By June 14, 2019
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip

    Top 10 weaknesses found by bug bounty hunters

    Companies paid $54 million last year to ethical hackers for detecting digital weak spots before the bad guys did. HackerOne ranked the most frequent vulnerabilities.

    By June 12, 2019
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Beyond the data breach: How retail is addressing cybersecurity

    Experts say companies need to implement data protection strategies including training employees across departments and vetting third-party partners.

    By Tatiana Walk-Morris • June 11, 2019
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Facial recognition tech deemed 'not ready for primetime' in House committee

    Members took issue with the technology on Tuesday, while law enforcement and federal government agencies defended its use.

    By Chris Teale • June 6, 2019
  • Image attribution tooltip
    Kendall Davis / BioPharma Dive
    Image attribution tooltip
    Deep Dive

    Checking for vitals: Inside the Quest Diagnostics, LabCorp supply chain breach

    The intrusion happened inside the American Medical Collection Agency, but responsibility is shared through its partner ecosystem.

    By Samantha Schwartz • June 6, 2019
  • Phishing campaign puts two-factor authentication at risk, but what are the alternatives?

    Even though the phishing campaign can sidestep 2FA, the security protocol is better than using only usernames and passwords.

    By Samantha Schwartz • June 6, 2019
  • An illustration of cyber security, showing a padlock over a circuit board.
    Image attribution tooltip
    Getty
    Image attribution tooltip

    LabCorp says 7.7M patients exposed in same data breach as Quest Diagnostics

    One of LabCorp's billing collections vendors experienced unauthorized activity on its web payment page between Aug. 1 and March 30.

    By Samantha Schwartz , David Lim • June 5, 2019
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip

    NSA, Microsoft issue BlueKeep vulnerability warnings, call for 'all hands on deck'

    Microsoft is "confident" an exploit exists for BlueKeep, a vulnerability in the Remote Desktop Protocol of older versions of Windows.

    By Samantha Schwartz • June 5, 2019
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    11.9M Quest Diagnostics patients potentially exposed to data breach

    Financial, medical and other personal information, such as Social Security numbers, may have been exposed, the company reported Monday morning.

    By Samantha Schwartz , David Lim • June 3, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    WannaCry exploits healthcare companies with older, unmanaged devices that are difficult to patch

    WannaCry is very much a threat, according to cybersecurity firm Armis. About 40% of healthcare delivery organizations have experienced at least one WannaCry attack in the last six months.

    By Shannon Muchmore • May 31, 2019
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cyberattacks by email impersonators are on the rise

    Seven in 10 companies hit by email impersonation lost data, money or customers, a Mimecast survey shows. Here are three ways to stave off attackers.

    By May 30, 2019
  • Focused on 'governance and controls,' Wells Fargo taps new CISO

    Change marks 2019 for Wells Fargo; in addition to new technology leaders, an external search is underway for a CEO.

    By Naomi Eide • May 29, 2019
  • An illustration of cyber security, showing a padlock over a circuit board.
    Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    The CIO's view: Critical strategies for winning the security arms race

    Securing the modern business is a relentless pursuit and can sometimes feel impossible as the pace of threats seem to accelerate every day, Signify's CIO writes.

    By Kurt De Ruwe • May 28, 2019
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    Equifax's cybersecurity woes earned it an outlook downgrade from Moody's

    It's the first time cybersecurity weighs on a company's outlook downgrade. Here's why it's unlikely to be the last.

    By May 28, 2019
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    For Graham Holdings, GDPR compliance was a breeze

    The company has a mandatory data inventory every year. It's "an enormous job but it's really critical to us to know what we have," Halota said.

    By Naomi Eide • May 23, 2019
  • Image attribution tooltip
    Photo by Paweł Czerwiński on Unsplash
    Image attribution tooltip

    Google left some G Suite passwords unhashed for almost 15 years

    Chances of Google falling under the regulatory spotlight are dim since no consumers were impacted, but the gaffe could tarnish trust in the company's services.

    By Naomi Eide • May 22, 2019
  • Opinion

    The true impact of GDPR is emerging now

    Businesses need the ability to easily trace data lineage if organizations hope to survive any kind of audit, Snowflake's Kent Graziano writes. 

    By Kent Graziano • May 20, 2019
  • Recorded Future: Ransomware attacks against cities increasing

    Attackers are stumbling into opportunities to hit governments, indicating security weaknesses.

    By Katie Pyzyk • May 16, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    CrowdStrike's chances on the market improve as more companies are hacked, breached

    The current security landscape prepared the stage for the cybersecurity unicorn to make its public debut.

    By Samantha Schwartz • May 15, 2019
  • Opinion

    4 keys to managing an information governance program

    Executive sponsorship and executive leadership are very different, writes Aaron Bryant, chief information governance officer at Washington State Department of Health.

    By Aaron Bryant • May 13, 2019
  • Microsoft's security recipe: Lock down admin accounts, eliminate passwords altogether

    To prevent over-provisioning, Microsoft established role-based access, tying access rules to the "systems, tools and resources" each role requires.

    By Naomi Eide • May 13, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Charles River sees minimal financial impact from cybersecurity breach

    An incident disclosed last week — discovered quicker-than-usual — likely won't result in significant costs, the company told investors.

    By Kristin Jensen • May 10, 2019
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    FTC requests greater data privacy authority for issuing penalties

    The agency served as the chief federal entity responsible for protecting consumer privacy — and then the internet happened, changing the scope of what the agency regulated.

    By Samantha Schwartz • May 9, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers are causing breaches, but can companies realistically protect themselves?

    Hackers have all the time in the world to figure out a system. Companies, on the other hand, take four years just to replace a server.

    By Samantha Schwartz • May 9, 2019
  • Eddie Bauer faces $9.8M tab for data breach

    The retailer also expects to spend about $5 million, taking steps to ensure that its payment and cybersecurity systems are safe, according to the agreement.

    By Daphne Howland • May 7, 2019