Security: Page 45
-
GAO: OPM making headway on security improvements, but more work required
Following a 2015 data breach, OPM is trying to update its security with guidance from the GAO.
By Samantha Schwartz • Aug. 4, 2017 -
Symantec offloads website security, certificate business for $950M
Though Symantec says the sale allows it to focus more on enterprise security, the deal rids the company of its troubled web certificate business.
By Naomi Eide • Aug. 3, 2017 -
Explore the Trendline➔
jariyawat thinsandee via Getty ImagesTrendlineIT Security
Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.
By CIO Dive staff -
Senators propose bipartisan law to secure IoT. But how?
The measure would place the onus on manufacturers to adequately secure internet-connected devices.
By Naomi Eide • Aug. 2, 2017 -
Netflix highlights risk of DDoS attacks, but at the application layer
In a Chaos Kong experiment, Netflix launched a mock rare attack that could take down an entire microservice architecture.
By Samantha Schwartz • Aug. 1, 2017 -
Anthem breached again after contractor emailed file with 18,500 members' info
The contractor was an employee of LaunchPoint Ventures, a third-party vendor which provides insurance coordination services to the payer.
By Naomi Eide • Aug. 1, 2017 -
Fake CEO emails dupe companies out of billions
In the past three years, these emails have cost employers $5.3 billion — much more than ransomware attacks.
By Valerie Bolden-Barrett • July 31, 2017 -
Deep Dive
Technobabble: All the places we can go with microchips and brain/computer interfaces
Hypochondriacs and conspiracy theorists must be having an adverse reaction today.
By Samantha Schwartz • July 28, 2017 -
Is the GSA reviving plans for civilian cybersecurity campus in DC?
The idea for the CCC has been on the table for a while, but nailing down the timing — and the funding — has been a challenge.
By Hallie Busta • July 28, 2017 -
McAfee report highlights importance of using human-machine teams
The report also found that the most successful cybersecurity teams automate threat investigation and allocate about 50% more time to threat hunting.
By Justine Brown • July 27, 2017 -
AMD backs off cryptocurrency even as demand grows
CEO Lisa Su says the company will not include cryptocurrency in its forecast.
By Justine Brown • July 27, 2017 -
SEC warns ICO users they must play by same rules as traditional securities
There is currently no regulatory oversight for Initial Coin Offerings.
By Justine Brown • July 27, 2017 -
The end of the road: Adobe to phase out Flash Player by 2020
Content creators are being advised by Adobe to begin moving existing Flash content to open formats.
By Justine Brown • July 26, 2017 -
Microsoft introduces tool to make Blockchain services more usable
Blockchain has potential for a wide range of uses in the enterprise, though it can be challenging for companies to figure out what to do with it and how to use it.
By Justine Brown • July 26, 2017 -
IBM launches IoT security testing service
The Watson-enabled security service was announced but how are organizations using it?
By Justine Brown • July 25, 2017 -
Mac threat revealed earlier this year may be worse than first reported
The malware enables hackers to access a computer's files, screens and webcams.
By Justine Brown • July 25, 2017 -
Deep Dive
4 innovative uses of blockchain in the enterprise
Experts say there's huge potential for blockchain in the enterprise, but how are organizations using it?
By Justine Brown • July 24, 2017 -
Tor Project to launch public bug bounty project
The Tor Project wants to find vulnerabilities that could compromise the anti-surveillance network.
By Justine Brown • July 21, 2017 -
BlackBerry pushes deeper into federal security space
The company was approved to sell its Secusuite tool for encrypting phone calls and text messages to federal government agencies.
By Justine Brown • July 21, 2017 -
Deep Dive
In an era of global malware attacks, what happens if there's no kill switch?
Unlike May's WannaCry attack, most cyberattacks do not come with a kill switch. To avoid panic, make preemptive actions and not reactionary ones.
By Samantha Schwartz • July 20, 2017 -
Attacks on iOS devices outpacing attacks on Android for first time
Mobile phones often operate outside of the range of a virtual corporate network and are fully controlled by employees, making them much more difficult to protect.
By Justine Brown • July 19, 2017 -
Google implements 'unverified app' amidst phishing worm
The phishing attack used an invitation to edit a Google Doc to access a Google Drive user's contact list to continue its wormability.
By Samantha Schwartz • July 19, 2017 -
Cost of education data breaches averages $245 per record
That's much higher than the worldwide cost of around $200 per record, according to a study from the Ponemon Institute.
By Shalina Chatlani • July 19, 2017 -
Why do former employees still have access to company networks?
Chalk it up to a lack of awareness, as 44% of OneLogin survey participants said they did not know whether former employees' accounts have been deactivated.
By Samantha Schwartz • July 18, 2017 -
FedEx's TNT Express still suffering effects of Petya cyberattack
The company said damage was so extensive, it may not be able to restore TNT's operations in full.
By Jennifer McKevitt • July 18, 2017 -
Cyence: Cost of cyberattacks could soon eclipse that of natural disasters
Cyberattacks globally cost businesses about $450 billion last year.
By Justine Brown • July 18, 2017