Security: Page 31
-
California passes net neutrality law, but DOJ sues over attempt to 'frustrate federal policy'
The state Silicon Valley calls home frequently sets the tone for what eventually becomes national rules for technology best practices.
By Samantha Schwartz • Oct. 1, 2018 -
50M Facebook accounts breached following 'security issue'
The social network is resetting the "access tokens" of 90 million accounts — 40 million of which weren't compromised, but were reset as a precaution.
By Naomi Eide • Sept. 28, 2018 -
Explore the Trendline➔
jariyawat thinsandee via Getty ImagesTrendlineIT Security
Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.
By CIO Dive staff -
Uber's record $148M fine highlights harsh repercussions for data breach disclosure failures
The lesson from Uber is failure to disclose has a negative impact, a message to big tech companies that they are not above the law.
By Naomi Eide • Sept. 27, 2018 -
'It's too late' to diversify cybersecurity workforce
By the time young students are old enough to enter the security workforce, cybersecurity will be "passé," said Dr. Alissa Johnson, VP and CISO of Xerox.
By Samantha Schwartz • Sept. 27, 2018 -
Why CISOs are not setting the business risk posture aymore
There is a widespread understanding among security professionals that the role of the CISO is evolving, as well as the role of IT.
By Samantha Schwartz • Sept. 27, 2018 -
With GDPR complaints rising, UK regulator quietly issued notice of violation
A Canadian firm that worked with political organizations to target ads in the UK was issued the notice in July and given 30 days to comply.
By Alex Hickey • Sept. 26, 2018 -
Digital transformation stalls when privacy, ethics, trust lag
"Privacy is not dead, but we're going to have to fight for it if we want it," said Laura Koetzle, VP and group director at Forrester Research.
By Alex Hickey • Sept. 26, 2018 -
Cryptojacking takes cyber threats to the 'Wild West'
The attacks are random and aggressive, forcing victims to maintain constant offensive and defensive security measures.
By Samantha Schwartz • Sept. 25, 2018 -
Underlying security issues exposed by State Department's email breach
Oregon Senator Ron Wyden released a letter voicing concern about malicious cyber activity in the personal accounts and devices of Senate members.
By Samantha Schwartz • Sept. 21, 2018 -
Big tech is rolling out tools to counter AI bias. Is it enough?
There are three levels of failure for AI algorithms: integrity of data, integrity of algorithms and the decision-maker. These tools tackle the first two.
By Alex Hickey • Sept. 21, 2018 -
More malware strains in H1 than all of last year bodes poorly for IoT
The Mirai family remains the preferred choice of hackers looking to infiltrate internet of things devices, accounting for almost 16% of attacks.
By Alex Hickey • Sept. 19, 2018 -
Data breaches take long-term toll on companies' stock performance
The aftermath of a breach puts a lot of strain on a company's ability to market itself as trustworthy.
By Samantha Schwartz • Sept. 17, 2018 -
Organizations are playing Russian roulette with malicious emails
It's important companies adopt learning and development practices so employees can better serve as the last line of defense.
By Samantha Schwartz • Sept. 14, 2018 -
Equifax breach, 1 year later: Unabating corporate cybersecurity negligence undercuts consumers
"Nobody went to jail," Kurtis Minder, CEO of GroupSense, a cyber reconnaissance firm, said following the lack of action taken by regulators.
By Naomi Eide • Sept. 7, 2018 -
2018 enterprise technology IPOs: Fall update
The late spring and summer months brought a new crop of IPOs with six enterprise technology companies concentrated in the fields of cybersecurity and software as a service.
By Alex Hickey • Sept. 7, 2018 -
T-Mobile suffered another data breach, but industry 'too jaded' to care
Security shortcomings have become so routine it is difficult to remain clued into the seriousness of the incident.
By Naomi Eide • Aug. 27, 2018 -
Deep Dive
From acquisitions to audits: What's going on with Symantec?
Though Symantec's stock has taken a notable hit since May, its products remain viable. And yet the dark cloud of an audit remains.
By Samantha Schwartz • Aug. 24, 2018 -
Health orgs aren't fully following IT safety advice, survey finds
The low compliance rate shows healthcare organizations have a long way to go to properly protect patient information.
By Les Masterson • Aug. 20, 2018 -
Q&A
After a 3-day cyberattack simulation, 'it's like crickets' for executives to discuss flaws, vulnerabilities
The city conducted the Jack Voltaic 2.0 exercise to answer a simple question: "If all sectors are under a coordinated cyberattack, would we be aware and able to handle it from within?"
By Katie Pyzyk • Aug. 17, 2018 -
Small business cybersecurity act becomes law, but is it enough?
The amendment requires NIST to provide cybersecurity resources for small businesses, but incentivizing small businesses to take a more active role and utilize them may prove a challenge.
By Alex Hickey • Aug. 16, 2018 -
Cisco evolving its product portfolio and the 'strategy is working,' CEO says
The company has embraced overhauling its product portfolio, revamping offerings for a more security-conscious world.
By Naomi Eide • Aug. 16, 2018 -
Juggling high-profile problems, Uber hires security officer
Matt Olsen joins the ride sharing company after Uber's former chief security officer was fired in the wake of the company's breach revelations last fall.
By Alex Hickey • Aug. 15, 2018 -
Privacy quandary: Companies track users' 'behavioral biometrics' in the name of security
Organizations that use behavioral biometrics to monitor customers carry a risk and have to ensure the data they're surveilling is not personal information.
By Samantha Schwartz • Aug. 15, 2018 -
Intel chip saga continues: 'Foreshadow' vulnerabilities disclosed
Dubbed 'Foreshadow,' the three flaws could be particularly devastating because they also allow malicious actors to access information in other virtual machines on the same cloud infrastructure.
By Alex Hickey • Aug. 15, 2018 -
Attack of the office relic: Researchers find exploitable flaws in fax machines, printers
While unplugging a printer or fax machine from its power supply can stop an intrusion, it's not a fix that many companies opt for.
By Samantha Schwartz • Aug. 13, 2018