Security: Page 7


  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs still expect cyber budget increases amid economic pressure

    Security executives continue to focus on maximizing value as they seek a more efficient and simplified security posture, according to a report from Nuspire.

    By David Jones • June 1, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip

    Palo Alto Networks teases plans for generative AI across security services

    The security vendor is taking a restrained approach to deploying generative AI products, but the company’s leaders still believe the technology will herald a major shift for cybersecurity.

    By Matt Kapko • May 31, 2023
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber resilience programs fall short on preparing workers for a crisis

    The report from Immersive Labs raises questions about whether corporate employees would know how to respond after a major cyberattack.

    By David Jones • May 30, 2023
  • Cybercriminal experts assemble in conference room.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Why and how to report a ransomware attack

    The majority of ransomware attacks go unreported, creating a blind spot that hampers response, recovery efforts and the prevention of future attacks.

    By Matt Kapko • May 19, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By May 18, 2023
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    SolarWinds turns to Infosys to accelerate SaaS shift

    The move eases the transition from on-prem to cloud-based software that was already underway, President and CEO Sudhakar Ramakrishna said.

    By May 11, 2023
  • The president joe biden stands behind a podium in front of the white house, shielding his eyes from the sun.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    White House considers ban on ransom payments, with caveats

    Experts suggest the effort, a reversal from the administration's previous stance, is fraught with complications that could cause unintended consequences.

    By Matt Kapko • May 8, 2023
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    What do CIOs and other cyber experts do to manage credentials? Hint: they don’t reuse passwords.

    By Matt Kapko • May 4, 2023
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort toward secure by design is seen as a potential game changer for software security, but may require investments and cultural changes.

    By David Jones • April 17, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    There’s a movement afoot to make tech vendors responsible for cybersecurity

    The international joint guide to secure by design encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design.

    By Matt Kapko • April 13, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an IAM system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By Matt Kapko • April 12, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks in the enterprise, creating business risk

    When an organization has little data visibility, it becomes even more vulnerable to leaks and breaches — as well as insider and external threats. 

    By Sue Poremba • April 11, 2023
  • A Samsung flag flies outside the Samsung office on August 25, 2017 in Seoul, South Korea.
    Image attribution tooltip
    Chung Sung-Jun via Getty Images
    Image attribution tooltip

    Samsung employees leaked corporate data in ChatGPT: report

    Data privacy is a concern for companies with employees using ChatGPT’s web-based interface, as input data is used to train and improve the tool.

    By April 7, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By David Jones • April 6, 2023
  • Side view of group of students coding on laptops in a computer lab
    Image attribution tooltip
    izusek via Getty Images
    Image attribution tooltip

    Upskilling, reskilling central to competing for tech talent, survey finds

    Leading organizations were more likely than their peers to put in place upskilling or reskilling initiatives, a report from NTT DATA found.

    By April 4, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines OpenAI's generative AI capabilities with Microsoft's threat intelligence and security network.

    By David Jones • March 28, 2023
  • A sign is posted in front of the Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California. Silicon Valley Bank was shut down on Friday morning by California regulators and w
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    Tech vendor risk raises vetting stakes in wake of SVB crisis

    Deposits are safe, but tech startups may no longer have access to venture debt and the lines of credit that helped fuel innovation.

    By March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 tips to counter identity and access management risks

    Many organizations rely on identity and access management tools for credential management and authentication. But these systems aren’t foolproof.

    By Matt Kapko • March 24, 2023
  • In this photo illustration, the home page for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    ChatGPT bug underlines need to limit shadow IT

    If you share information with the tool, you do so at your own risk, according to experts.

    By March 23, 2023
  • Federal Trade Commission Chair Lina Khan listens as U.S. President Joe Biden delivers remarks on the economy in the Eisenhower Executive Office Building on October 26, 2022 in Washington, DC.
    Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    FTC opens inquiry into cloud market competition, security

    As consolidation among hyperscalers grows, federal authorities are raising concerns over cloud dependence in critical sectors.

    By March 22, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By Matt Kapko • March 22, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. announced plans to shift liability for weak product security onto the tech industry.

    By David Jones • March 21, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Workforce reductions hinder tech upskilling: report

    As layoffs and hiring freezes reach tech companies, funding and scheduling training becomes a problem, a Pluralsight report found.

    By March 20, 2023
  • Silhouette of teams playing tug of war
    Image attribution tooltip
    Chris Gorgio via Getty Images
    Image attribution tooltip

    Cybersecurity market confronts potential consequences of banking crisis

    Bank seizures impose new challenges on vendors in every segment — and may spur consolidation.

    By Matt Kapko • March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    Threat hunters and security executives warned organizations to look out for malicious activity as regulators step in to operate Silicon Valley Bank.

    By Matt Kapko • March 15, 2023