Security: Page 42


  • Deep Dive

    Mr. Smith goes to Washington: Former Equifax CEO testifies before House committee

    Committee members and Smith hashed out events surrounding the breach, which can be viewed in this feature, and raised concerns over the amount of sensitive consumer data collected and stored by large corporations. See story for timeline.

    By Oct. 4, 2017
  • DHS can't enforce Kaspersky ban on private sector, but remains vigilant

    The company's products are still widely used by U.S. consumers and the enterprise, but the DHS' decision pushed companies like Best Buy and Office Depot to remove Kaspersky products from their shelves.

    By Samantha Schwartz • Oct. 4, 2017
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yahoo admits all 3B user accounts were hit by 2013 data breach

    The company, now a part of Verizon's Oath, emphasized that the additional impacted accounts did not stem from a new security incident.

    By Naomi Eide • Oct. 3, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Three tips for securing hybrid IT

    By understanding the differences in security demands for cloud and on-premises environments, enterprises can be confident applications and data across a hybrid IT landscape are secure.

    By Suresh Sridharan • Oct. 3, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    2.5M more consumers impacted by Equifax breach; investigation continues

    Equifax is being investigated by the FTC and bogged down by more than 30 lawsuits, not to mention heavily criticized by politicians and the population for its handling of the breach.

    By Oct. 3, 2017
  • Poor access control dooms federal cybersecurity, watchdog finds

    About 90% of cyber risks are a result of human error, and the Government Accountability Office's information security report highlights the matter. 

    By Samantha Schwartz • Oct. 3, 2017
  • Image attribution tooltip
    Gettty / edited by Industry Dive
    Image attribution tooltip
    Deep Dive

    On the chopping blockchain: Where does the ledger technology go from here?

    A handful of high-profile use cases exist in the financial services, but experts maintain in coming years blockchain will hit its stride in supply chains, data management and cybersecurity.

    By Oct. 2, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime costs US companies $21.2M per year, study finds

    Savvy hackers are taking advantage of an understaffed security workforce and using trusted applications as an entry point into company networks. 

    By Samantha Schwartz • Sept. 29, 2017
  • NERC proposal targets cybersecurity risks in electric system supply chains

    The new standards aim to reduce the likelihood that an attacker could exploit legitimate vendor patch management processes to deliver compromised software updates to the U.S. bulk electric system.

    By Robert Walton • Sept. 28, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip
    Deep Dive

    Equifax breach: What you need to know

    Since the breach was first disclosed at the beginning of September, Equifax has undergone a slew of changes, highlighting how large-scale security incidents can impact an organization's bottom line. 

    By Naomi Eide • Sept. 27, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How execs can quantify the ROI of cybersecurity: a model

    Think of cybersecurity like you would a supply chain — each link is important, but a cyberattack on certain partners may require a more in-depth continuity plan than others.

    By Edwin Lopez • Sept. 27, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Smart watches, lighting, cities … is the IoT the newest weapon of the cybercriminal?

    Twenty years ago, IT networks were easy to map — once some PCs and a printer were linked to the server, most workspaces were ready to go. It's no longer that simple. 

    By Scott Millis • Sept. 27, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax CEO Richard Smith retires

    The board announced CEO Richard Smith is retiring, effective Tuesday. This comes on the heels of the retirement of the company's CIO and CSO less than two weeks ago.

    By Samantha Schwartz , Sept. 26, 2017
  • Microsoft unveils new cloud security features at Ignite

    The evolving sophistication of hackers is forcing companies to integrate more built-in security services and tools.

    By Samantha Schwartz • Sept. 26, 2017
  • Top cybersecurity consulting firm Deloitte discloses attack

    Deloitte was made aware of the hack in March, but it is believed the incident dates back to October or November 2016. 

    By Samantha Schwartz • Sept. 26, 2017
  • FICO bolsters cybersecurity in wake of Equifax breach

    The credit scoring company joins other large companies, like Google and Microsoft, in upping security measures since the breach.

    By Sept. 25, 2017
  • Deep Dive

    Technobabble: Bill Gates' regret and brains becoming internet-connected

    A new IoT device is emerging. Researchers used an EEG headset to connect a human brain to the internet in real time, a breakthrough in the field of brain-machine interfaces. 

    By Samantha Schwartz , Sept. 22, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CCleaner attack targeted 'intellectual property' of top tech firms including Microsoft, Cisco

    The attack went undiscovered for four weeks and targeted leading tech firms, demonstrating a high-level of attacker sophistication. 

    By Samantha Schwartz • Sept. 22, 2017
  • SEC data breach may have led to 'illicit gain through trading'

    The intrusion was detected in 2016 and a patch was administered. However, the SEC learned in August that hackers were still able to exploit the software vulnerability in EDGAR's test filing component. 

    By Samantha Schwartz • Sept. 21, 2017
  • FedEx takes $300M hit to operating income after Nyetya

    The 3PL's operating income fell 11% compared to the same period last year, partly due to the cyberattack and Hurricane Harvey.

    By Edwin Lopez • Sept. 21, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    When public cloud security concerns persist, companies look to encryption

    Though 80% of those surveyed by Bitdefender say encryption is the most effective way to store securely in the cloud, only one in six encrypt all data stored in the public cloud.

    By Naomi Eide • Sept. 20, 2017
  • IBM edges out Microsoft, Accenture in blockchain race

    Big Blue was ranked first for its large R&D blockchain efforts and wide array of clients using the technology across industries and verticals, according to Juniper Research.

    By Sept. 19, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax suffered another breach in March

    The March data breach was unrelated to the security incident discovered on July 29, the company said. 

    By Naomi Eide • Sept. 19, 2017
  • Hackers exploit vendor trust in worm-like malware attack on CCleaner

    The popular system maintenance tool for Microsoft Windows devices had a malicious malware implanted in its software, impacting 2.27 million users.

    By Samantha Schwartz • Sept. 19, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Microsoft, Google boost cloud security amid growing cyberthreat landscape

    The companies unveiled security features guarding against third-party intrusion at a time when the industry has an increased focus on cybersecurity.

    By Sept. 18, 2017