Security: Page 6


  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Software industry urged to assume risk on open source security

    The Open Source Security Foundation called on commercial and non-commercial organizations that use open source software components to adopt better security practices.

    By David Jones • Sept. 1, 2023
  • Person pushing large stone uphill
    Image attribution tooltip
    Nastco via Getty Images
    Image attribution tooltip

    Security basics aren’t so basic — they’re hard

    Lax security controls cause heavy damages, and security experts warn unmet basic requirements lead, time and again, to data breaches.

    By Matt Kapko • Aug. 21, 2023
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • A fashionable Hispanic woman works in her small retail clothing store, selling new fashion items. She cashes out a customer.
    Image attribution tooltip
    RyanJLane via Getty Images
    Image attribution tooltip
    Sponsored by Shopify

    Hidden revenue: Checkout is the key to conversion in retail

    Learn how important the customer checkout experience is in e-commerce.

    Aug. 21, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, according to AWS’ Mark Ryland.

    By Matt Kapko • Aug. 18, 2023
  • An employee speaks during a meeting on a SaaS video conferencing solution.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Zoom’s AI terms overhaul set the stage for broader data use scrutiny

    The shift to adopt generative AI has created tension between SaaS vendors' data desires and enterprises' security concerns.

    By Aug. 16, 2023
  • A sunlit New York Stock Exchanges is seen with 6 columns and 3 American flags with people walking by in shadow.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    SEC cyber rules ignite tension between reputation and security risk

    The rules, which take effect Sept. 5, encountered mixed reactions. Some champion board-level accountability. Others say the rules are too big of a lift.

    By David Jones • Aug. 16, 2023
  • Dark servers data center room with computers and storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Microsoft, cloud security under the microscope with federal cyber review

    The federal Cyber Safety Review Board will examine issues related to the state-linked hack of Microsoft Exchange and larger concerns tied to identity management and authentication.

    By David Jones • Aug. 14, 2023
  • A group of people standing around a display of video screens
    Image attribution tooltip

    Maxim Hopman/unsplash.com

    Image attribution tooltip
    Sponsored by Elastic

    How to create seamless customer journeys with generative AI

    Explore the transformative power of generative artificial intelligence (GAI) in enhancing customer experiences, leveraging big data and fostering brand loyalty.

    By Rick Laner, Chief Customer Officer, Elastic • Aug. 14, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Matt Kapko • Aug. 10, 2023
  • U.S. President Joe Biden waves toward visitors watching the departure as he walks to Marine One on the South Lawn of the White House July 28, 2023 in Washington, DC.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House launches AI cyber competition to fix software vulnerabilities

    In partnership with OpenAI, Anthropic, Google and Microsoft, participants will have access to top AI companies’ technology for designing new cybersecurity solutions.

    By Aug. 9, 2023
  • A sign is posted on the exterior of Zoom headquarters on February 07, 2023 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Zoom emphasizes customer consent as critics question AI service terms

    Concerns stem from what Zoom says it will do with customer and service-generated data and what its policy language allows. 

    By Updated Aug. 11, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS pledges $20M to K-12 cyber training, incident response

    The cloud services provider is participating in a broad White House plan to build additional protection to defend schools against ransomware and other threats.

    By David Jones • Aug. 8, 2023
  • SEC reporting
    Image attribution tooltip
    Kobus Louw via Getty Images
    Image attribution tooltip

    Businesses improved cyber incident response times following Log4j, report finds

    Security teams have improved their response times during attacks, but post-incident recovery still lagged, according to Immersive Labs.

    By David Jones • Aug. 4, 2023
  • An executive signs paperwork inside a meeting room, two workers sitting at either side
    Image attribution tooltip
    NoSystem Images via Getty Images
    Image attribution tooltip

    C-suite, rank-and-file at odds over security’s role

    Half of executives say security is prioritized when implementing a cloud strategy. Most security workers beg to differ.

    By Aug. 3, 2023
  • Bank sign on glass wall of business center
    Image attribution tooltip
    ultramarine5 via Getty Images
    Image attribution tooltip

    FINOS moves to rationalize financial industry cloud controls

    Citi, Goldman Sachs and Morgan Stanley are among the companies participating in the Fintech Open Source Foundation project, which will introduce a framework this year.

    By July 28, 2023
  • Close up photo of a man in a suit.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    SEC votes to overhaul disclosure rules for material cyber events

    After a fierce debate, the agency voted to require companies to come clean on material breaches and attacks within four business days of determination.

    By David Jones • July 26, 2023
  • Businessman does Financial Analysis talks to Group of Businessspeople. Projector Screen Shows Stock Market Data, Investment Strategy, Revenue Growth.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cybercriminals target highly profitable companies, study finds

    Damage from cybercrime far exceeds the sum of costs to targeted companies, harming peer companies and the broader economy, researchers at AEI found. 

    By Jim Tyson • July 7, 2023
  • A robot's hands are seen typing on a computer keyboard.
    Image attribution tooltip
    XH4D via Getty Images
    Image attribution tooltip

    The role for AI in cybersecurity

    Generative AI can become an ally for new security professionals who may otherwise feel overwhelmed. For more seasoned security analysts, it can offer time to refine their skills through automation of repetitive tasks.

    By Sue Poremba • July 5, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    AI linked to new crop of business email scams

    Fraudsters appear to be using AI to craft well-written, malicious email messages at scale.

    By Alexei Alexis • June 28, 2023
  • Google and the Consortium of Cybersecurity Clinics are collaborating on an effort to train diverse students in cybersecurity.
    Image attribution tooltip
    Courtesy of Consortium of Cybersecurity Clinics
    Image attribution tooltip

    Google backs $20M effort to train students for key cybersecurity jobs

    The program will train diverse students at 20 higher education centers in the U.S. Students will then provide services at under-resourced infrastructure providers.

    By David Jones • June 27, 2023
  • Digital background depicting innovative technologies in security systems, data protection Internet technologies 3d rendering
    Image attribution tooltip
    Olemedia via Getty Images
    Image attribution tooltip
    Sponsored by Miro

    6 strategies for optimizing the security of your SaaS stack

    Learn more about different solutions for how your organizations can enhance the security of your ever-growing SaaS stacks.

    By Robbie Strickland, Chief Information Officer at Miro • June 26, 2023
  • An illustration of people using computers with dialogue bubbles and a robot on a screen.
    Image attribution tooltip
    girafchik123 via Getty Images
    Image attribution tooltip

    Cyber CEOs are all-in on generative AI

    Generative AI and LLMs are gaining attention in the security industry, but not everyone is convinced the technologies will deliver the benefits promised.

    By Matt Kapko • June 23, 2023
  • Fintech electronic banking mobile network technology
    Image attribution tooltip
    alexsl via Getty Images
    Image attribution tooltip
    Sponsored by Elastic

    Banks are leveraging modern cloud security tools to mitigate human error

    The financial sector’s cloud workloads more than doubled from 2021 to 2022. What does this mean for the industry?

    By Brandon Mavleos • June 20, 2023
  • Kemba Walden, acting national cyber director, speaks with David Levy, VP, government, nonprofit and healthcare at AWS, during a fireside chat at the AWS Summit with David
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    Hyperscalers seen as key tool in shifting balance of cyber risk

    The acting national cyber director says more oversight may be necessary, but a resilient cloud infrastructure is critical to the national cybersecurity strategy.

    By David Jones • June 12, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    Cybercriminals target C-suite, family members with sophisticated attacks

    Senior executives are being targeted for IP theft, doxxing and extortion, often through home office networks.

    By David Jones • June 7, 2023