Security: Page 33


  • After NotPetya, FedEx invests in security and flexible IT

    How companies choose to embrace technology after a cyberattack speaks to their acceptance of digital transformation. 

    By Samantha Schwartz • June 26, 2018
  • What is WPA3 and why should businesses care?

    The Wi-Fi protection protocol includes improved network resiliency, protective management frames for critical workloads and 192-bit cryptographic strength.

    By June 26, 2018
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • AI, blockchain top this season's companies to watch hot list

    Both domains are surrounded by more hype than meaningful application, but early innovators are setting the standards and roadmap for the technologies.

    By June 14, 2018
  • 'Cattle-not-pet' system management could have prevented Atlanta's ransomware attack

    By managing systems "like cattle, not pets," IT can just eliminate what is threatening the rest of the system or "herd."

    By Samantha Schwartz • June 8, 2018
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    Why DevOps is the answer to reducing security flaws and risk

    Companies inherently reduce risk by making smaller changes at once, said Mark Nunnikhoven, VP of cloud research for Trend Micro.

    By Naomi Eide • June 7, 2018
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Cybersecurity vendors put money where their mouth is with $1M warranties

    Like a car manufacturer that has to recall a faulty automobile, cyber warranty programs move the onus of responsibility to vendors. 

    By June 7, 2018
  • To suss out hacking, hire people who think like hackers, say security experts

    Hackers exploiting how humans "orient" themselves are likely to achieve their objective, so a change in the security culture alone is not enough.

    By Samantha Schwartz • June 7, 2018
  • Sen. Warner to tech industry: 'Work with us'

    The U.S. needs a strong relationship between Congress and tech because "if you leave us on our own, we're going to mess it up," said the Virginia democrat.

    By June 6, 2018
  • How viable is machine learning for cybersecurity?

    Business professionals who have been riding the ML high may be in store for a "hangover" when the trough of disillusionment hits. 

    By June 5, 2018
  • How to get MTTR down to zero

    Automated tools to reduce Mean Time to Remediation can make cloud infrastructure "self-healing," said Josh Stella, CEO and co-founder of Fugue.

    By Samantha Schwartz • June 1, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal agencies struggle with identifying cyberattack vectors

    Agencies tend to allocate cyberdefense funds for "single point solutions" for "perceived security gaps" instead of the gaps that are already exploitable.

    By Samantha Schwartz • June 1, 2018
  • Deep Dive

    The right training program could prevent your next data breach

    A great cybersecurity learning strategy raises awareness, but it also gives employees tools to recognize and report risks.

    By Riia O'Donnell • May 31, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    5 experts discuss how they got into cybersecurity

    Though security education is becoming more formalized in university settings, many experts find themselves in cybersecurity by chance.

    By Naomi Eide • May 31, 2018
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip
    Deep Dive

    What Georgia's failed 'hack back' bill says about the future of cybersecurity laws

    Legislation proposing a retaliatory cyberattack as a line of defense misses the opportunity to understand how hacks happen and how to prevent them.

    By Samantha Schwartz • May 29, 2018
  • An illustration of cyber security, showing a padlock over a circuit board.
    Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Security tactics that won't slow your business down

    The threat landscape is ever-changing, and the focus has shifted from keeping the attacker out to "what do we do and how will we know if they are already in?"

    By Craig Riddell • May 29, 2018
  • Google and AWS lead in cloud native security

    Security and risk professionals are increasingly reliant on the security capabilities built into public cloud offerings, believing it offers better security and price compared to what in-house teams could do on-premise. 

    By May 24, 2018
  • Cybersecurity experts agree — expect more ransomware this year

    Hackers will always take advantage of human error and poor judgment, so it’s up to security teams to educate line of business employees.

    By Samantha Schwartz • May 24, 2018
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Employees use personal devices for work without much oversight

    Employees performing everyday work tasks using unsecured devices can present the highest cybersecurity risks — especially in the age of BYOD.

    By Valerie Bolden-Barrett • May 22, 2018
  • Image attribution tooltip
    Kendall, Industry Dive
    Image attribution tooltip

    All in the family: Meltdown, Spectre variants found

    Variant 4 takes advantage of "speculative bypass," which grants a hacker access to stored memory in a CPU's stack.

    By Samantha Schwartz • May 22, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    With fears of full-scale cyberwar, questions of attribution arise

    Script kiddies and credential stuffers aside, the increase in nation-state activity and cyberespionage threats have begun to plague organizations across sectors. 

    By Naomi Eide • May 22, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Going serverless? Prepare for a shake-up in security

    A serverless environment means "moving parts" and organizations can "quickly lose control" when DevOps teams are tasked with engaging with a cloud, according to Gadi Naor, CTO of Alcide.

    By Samantha Schwartz • May 18, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Leadership and longevity, the keys to GDPR compliance

    Through the many paths to compliance, a few clear lessons and trends are emerging.

    By May 18, 2018
  • How IBM is using Latin flowers to help companies comply with GDPR

    The engine converts names, birthdays, addresses and other types of personally identifiable information into a series of random identifiers.

    By Samantha Schwartz • May 16, 2018
  • Facing international pressure and lost business, Kaspersky moves critical infrastructure to Switzerland

    The move is an attempt to distance the company from its Russian roots following backlash from the U.S. government and other customers last fall.

    By Samantha Schwartz • May 15, 2018
  • Atlanta mayor says cyberattack came as 'surprise' to city, residents

    Keisha Lance Bottoms said her constituents had not viewed cybersecurity as vital until the ransomware impacted their interactions with government.

    By Chris Teale • May 14, 2018