Security: Page 35


  • Deep Dive

    RSAC: 3 key cyberthreats to watch in 2018

    Data repository leaks, cryptomining and vulnerable industrial code are growing cyberthreats in the enterprise, but companies can fight back.

    By Samantha Schwartz • April 19, 2018
  • Image attribution tooltip
    Flickr
    Image attribution tooltip

    Threat hunting 101: Security experts weigh merits of automating an evolving field

    "A bear is a bear" no matter what "forest" or network they are intruding in, according to a CTO. The best leads to take while hunting for those bears include looking for reconnaissance tools.

    By Samantha Schwartz • April 18, 2018
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Teaching AI to detect malware, one data set at a time

    Working together through commercial agreements and opening data sets for research and algorithm training can bolster enterprise cybersecurity.

    By April 18, 2018
  • Image attribution tooltip
    Samantha Schwartz for CIO Dive
    Image attribution tooltip

    Microsoft offers IoT solution as answer to hardware security shortcomings

    To take “cybersecurity from an art to a science,” Microsoft is engineering a more secure edge with Azure Sphere, according to President Brad Smith.

    By Samantha Schwartz • April 17, 2018
  • SamSam, Locky, Cerber: In ransomware, past strains can reveal cyberattack motives

    Just because hackers left a branded handprint on WannaCry and NotPetya does not mean companies should know what to expect from future attacks.

    By Samantha Schwartz • April 17, 2018
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    To improve cybersecurity diversity, destroy the 'hacker in a hoodie' stereotype

    Cybersecurity is considered "pale, male and stale," said Kim Jones at RSAC. Without an image makeover, it's doomed to remain stagnant and homogenous.

    By Naomi Eide • April 17, 2018
  • Image attribution tooltip
    Raytheon
    Image attribution tooltip

    The students, startups and tech poised to disrupt cybersecurity

    Hackers and crimeware come back year after year with a vengeance. Will the rising stars be able to overcome talent limitations to beat them?

    By April 16, 2018
  • Image attribution tooltip
    Unsplash
    Image attribution tooltip

    Gmail is going 'confidential' to prevent unintended data sharing

    The redesign of the platform will address companies' concerns over employee email habits.

    By Samantha Schwartz • April 16, 2018
  • FTC expands Uber settlement following last year's breach revelations

    Each violation of an issued consent order from the agency can result in a civil penalty up to $41,484.

    By Samantha Schwartz • April 13, 2018
  • Are gamers the answer to the cybersecurity skills gap?

    Demand is outpacing talent in the cybersecurity field, but a new report from McAfee suggests that gamers might just be the answer.

    By Riia O'Donnell • April 12, 2018
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip
    Deep Dive

    5 things to watch at RSA Conference 2018

    If you haven't created a RSAC bingo card yet, now's the time. Be on the lookout for the overuse of terms like "nation state actors," "cyberwar" and "GDPR."

    By Naomi Eide • April 11, 2018
  • Mozilla: Facebook, Google 'consolidation of power' undermining users' privacy

    When companies gather overwhelming amounts of personal data, a lack of healthy competition constricts the innovation pipeline, according to Mozilla. 

    By Samantha Schwartz • April 11, 2018
  • Image attribution tooltip
    Wikimedia Commons
    Image attribution tooltip
    Deep Dive

    Facebook has 911 MB worth of data on me, how much should I really care?

    Many have a laissez faire approach to Facebook in a post-Cambridge Analytica world, and maybe that's okay.

    By Samantha Schwartz • April 6, 2018
  • Breaches galore: Malware attack on vendor at heart of Delta, Sears data breaches

    From soup to passports to shoes, businesses across industries were victims to this week's latest security breaches.

    By Samantha Schwartz • April 6, 2018
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Ransomware in 2017 set industry up for distraction, destruction in 2018

    Whether it's misjudgment, misconfiguration, outdated software or falling for a phishing scheme, humans play a hand in their cyber woes.

    By Samantha Schwartz • April 5, 2018
  • Atlanta still struggling to get out from ransomware attack's grip

    Attackers appeared to change some documents, with some files tweaked to include "weapologize" and "imsorry."

    By Samantha Schwartz • April 3, 2018
  • Opinion

    More than money: How to woo cybersecurity professionals

    If expectations aren't clear and opinions aren't valued, cybersecurity professionals will move on to another opportunity where they see an easier road to career success. 

    By Wesley Simpson • April 2, 2018
  • 'All hands on deck': Boeing hit by WannaCry

    Boeing confirmed the cyberattack on its commercial airplane division following reports from The Seattle Times.

    By Samantha Schwartz • March 29, 2018
  • Image attribution tooltip
    Dropbox
    Image attribution tooltip
    Sponsored by Dropbox

    Dropbox is committed to protecting your personal data

    At Dropbox, we see data protection as integral to our work, and as we’ve grown, the way we handle and protect the data our customers entrust to us has remained a priority.

    March 28, 2018
  • Image attribution tooltip
    Dropbox
    Image attribution tooltip
    Sponsored by Dropbox

    Where does the GDPR apply?

    Under the GDPR, the location of the individual whose data is being processed is a key factor, whereas the existing EU Data Protection Directive is more concerned with the location of the processing. 

    March 26, 2018
  • UPDATE: Atlanta's computers crippled by ransomware, issues unresolved after 4 days

    City leaders said it is unclear to what extent the city and its residents have been affected and declined to say if they would pay any ransom.

    By Kristin Musulin , Samantha Schwartz • March 26, 2018
  • Sponsored by Dropbox

    The GDPR's accountability principle: A shift in mindset

    The latest ruling from the GDPR calls for a more proactive and holistic approach towards achieving data protection compliance than the existing legal framework.

    March 22, 2018
  • Orbitz attack compromised payment and PII of 880K

    The travel site seems to have followed proper disclosure protocols. Whether security was up to par when the intrusion happened remains to be seen.

    By March 21, 2018
  • Cybersecurity is struggling with diversity, but workers say mentorships could help

    While minority representation within the field is slightly higher than the overall workforce, minorities are in lower-level positions and are paid less than their peers, according to an (ISC)² report.

    By Valerie Bolden-Barrett • March 20, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Could GDPR have stopped the Cambridge Analytica scandal?

    Had the scandal broken almost two months later, it may have subjected Facebook to fines of 4% of global turnover for violation of GDPR mandates.

    By March 20, 2018