Security: Page 34


  • Deep Dive

    WannaCry's more profitable successor: Cryptomining

    While cryptomining poses little business interruption, a fluctuating cryptocurrency market could unleash a return to traditional attack vectors. 

    By Naomi Eide • May 11, 2018
  • Image attribution tooltip
    Elizabeth Regan for CIO Dive
    Image attribution tooltip

    How 4 security experts are ringing in WannaCry's anniversary

    Go ahead, reach for the Kleenex.

    By Samantha Schwartz • May 11, 2018
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    6 cybersecurity experts share twitch-inducing pet peeves

    Annoyances and pet peeves can fester at work and make for tense lunchroom conversations. But as professionals, overreaction isn't recommended. 

    By Naomi Eide • May 10, 2018
  • Georgia governor vetoes flawed 'hack back' bill; legislators back to the drawing board

    Microsoft, Google, cybersecurity experts and hacktivists adamantly opposed the bill, which would have made it possible for security researchers looking for hackable flaws to go to jail.

    By Samantha Schwartz • May 9, 2018
  • How Fitbit steps up security

    "We're kind of the best house in a bad neighborhood," said Marc Bown, director of security.

    By Samantha Schwartz • May 8, 2018
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    11K organizations use outdated software linked to Equifax breach

    One company's tragedy is another company's lesson. For a range of reasons, organizations have ignored the warning signs displayed by the fall of others.   

    By Samantha Schwartz • May 8, 2018
  • Meltdown and Spectre are not done yet — 8 flaws reported

    Intel responded to the reports saying it has always been in the company’s best practice to have a "coordinated disclosure" of "potential issues."

    By Samantha Schwartz • May 4, 2018
  • Hackers are using GDPR to disguise phishing schemes

    Emails impersonating Airbnb GDPR notices typically use a "bogus variation" of an email address meant to look legitimate, like "@mail.airbnb.work."

    By Samantha Schwartz • May 4, 2018
  • Image attribution tooltip
    Elizabeth Regan for CIO Dive
    Image attribution tooltip

    Down the rabbit hole: A tour of the dark web

    The deep web is the middle ground, partially hidden and unindexed by search engines. True mayhem lurks beneath that.

    By Samantha Schwartz • May 4, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Will confidential computing incentivize companies to move more sensitive data to the cloud?

    Google launched an open-source framework to develop applications in trusted execution environments, a new level of security for sensitive workloads and information.

    By May 3, 2018
  • Generation agnostic: Millennials and baby boomers fall short in cybersecurity

    Cloud-based sharing methods and limited credential access are easy ways to limit an employee's chances of compromising an organization's security.

    By Samantha Schwartz • May 3, 2018
  • What you need to know about password management

    Organizations are implementing multi-factor authentication and installing enterprisewide password manager requirements. But will it be enough?

    By Naomi Eide • May 1, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    UN CIO: Tech companies must take responsibility for new 'species of technology'

    Companies can combat unintentional side effects of AI with careful preparation, starting with a focus on programmed biases and the underdeveloped AI workforce.

    By Samantha Schwartz • May 1, 2018
  • What happens when the world meets for a simulated cyberattack

    Last week, cyber defenders around the world gathered to test their ability to defend critical IT infrastructure from the intensity of a real-time cyberattack.

    By Samantha Schwartz • April 30, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Is the tech worth the risk? CISOs struggle to navigate complex, overloaded security landscape

    With thousands of products to choose from, and little guidance from stakeholders, security leaders are facing an unwieldy industry.

    By Naomi Eide • April 30, 2018
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    Patch up or pay up: Equifax spent $243M on data breach recovery costs

    Even with the additional costs related to the breach, the company had a 4% increase in revenue compared to Q1 2017. 

    By Samantha Schwartz • April 26, 2018
  • Insider cyberthreats on the rise; SunTrust pays steep price

    It takes about two months to contain an insider security incident and could cost nearly $9 million over a 12-month period, according to ObserveIT.

    By Samantha Schwartz • April 25, 2018
  • With recovery costs reaching nearly $2.7M, should Atlanta have paid the ransomware demand?

    The recovery costs were more than 50 times the $51,000 demand to unlock Atlanta's technical infrastructure.

    By Samantha Schwartz • April 24, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Deep Dive

    Practices 7 technology pros use to keep hackers at bay

    Hackers are going for the easily compromised targets, so "you don't have to outrun the bear, you just have to outrun the other guy." 

    By Naomi Eide , April 23, 2018
  • Deep Dive

    How cybercriminals get in, and what to do to stop them

    No matter how good password management gets, hackers always seem to be one step ahead. Here's how they do it and steps businesses can take to stop it.

    By April 23, 2018
  • Deep Dive

    Faces, fingers and behavior: The future of passwords

    A passwordless future would place the onus of securing identities on biometrics and behavioral insights, rather than words, numbers, characters and phrases.

    By Naomi Eide • April 23, 2018
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip
    Deep Dive

    Securing logins ... what's the worst that could happen?

    Are passwords the sole cause of breaches? Absolutely not, but because of their "brittleness" they stand firmly as a contributing part of the security problem.

    By Samantha Schwartz • April 23, 2018
  • Deep Dive

    5 password management trends businesses need to know

    Despite improving technology, password security continues to plague businesses. But understanding what's going on in the space can make counteracting malicious account compromise a little easier.

    By Naomi Eide , Samantha Schwartz , April 23, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    RSAC's mobile app API flaw caused mini data leak

    In 2014, a similar flaw in the conference's app left the attendees' personal information, including titles, employers and nationality, vulnerable.

    By Samantha Schwartz • April 23, 2018
  • Oracle's patch updates include 254 security fixes

    Customers who failed to update vulnerabilities with already available patches are still experiencing attacks.

    By Samantha Schwartz • April 20, 2018