Security: Page 8


  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By Matt Kapko • March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Hispanolistic via Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By Matt Kapko • March 6, 2023
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies.
    Image attribution tooltip
    Permission granted by Office of the National Cyber Director
    Image attribution tooltip

    The US cyber strategy is out. Now, officials just have to implement it

    Industry stakeholders signal a willingness to discuss further steps, while congressional leaders hint additional action may be on the table.

    By David Jones • March 3, 2023
  • burnout at work
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Stressed much? It’s chronic in cybersecurity

    The psychological toll of security will spur high levels of churn among security leaders, Gartner expects.

    By Naomi Eide • Feb. 28, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Matt Kapko • Feb. 21, 2023
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT, too. Here’s what businesses should watch

    While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.

    By Feb. 21, 2023
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip

    IT security budgets triple as businesses confront more cyberattacks

    About half of all businesses suffered a breach or attack in 2022, versus 39% in 2020, according to specialty insurance provider Hiscox.

    By David Jones • Feb. 16, 2023
  • A worker types lines of code in a laptop with a dark screen.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    GitHub Copilot for Business, now in public release, weaves in security

    The AI-powered coding tool now sports a more advanced OpenAI model.

    By Feb. 14, 2023
  • Photo of 3 ChatGPT-generated questions for daters on OkCupid
    Image attribution tooltip
    Permission granted by OkCupid
    Image attribution tooltip

    OkCupid helps users find love through ChatGPT

    Love is in the air with help from AI, but experts caution against ChatGPT-powered catfishing.

    By Feb. 14, 2023
  • A frustrated young person in yellow sweater stands at table and touches their face with their hand while packing stuff up in office after dismissal
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Layoffs come for cybersecurity, too

    Even companies in more insulated fields, such as cyber vendors Sophos, Okta and Secureworks, are bound to feel the pain as enterprises cut spending.

    By Matt Kapko • Feb. 9, 2023
  • A statue of the first United States Secretary of the Treasury Alexander Hamilton stands in front of the U.S. Treasury.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    US government weighs in on cloud adoption in banking

    The Department of the Treasury stood up an interagency group to provide neutral guidance as financial services companies accelerate cloud migration.

    By Feb. 9, 2023
  • An executive leads a company meeting inside a boardroom
    Image attribution tooltip
    Jacob Lund via Getty Images
    Image attribution tooltip

    Corporate boards struggle to understand cybersecurity and digital transformation

    Boards are trying to understand the ever-evolving threat landscape as federal regulators plan additional breach disclosure rules.

    By David Jones • Feb. 6, 2023
  • Gold colored piggy bank sitting over a bar graph.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    CISOs to face new budget hurdles in 2023 as economic anxiety lingers

    Boards and the C-suite still see cybersecurity as a cost center, forcing CISOs to rethink their approach amid cost cuts become more prominent. 

    By David Jones • Jan. 31, 2023
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft surpasses $20B in security revenue as enterprise customers consolidate

    The company’s cybersecurity business is growing, but CEO Satya Nadella warned that customers, in an uncertain economy, are exercising caution.

    By David Jones • Jan. 30, 2023
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Threat actors are using remote monitoring software to launch phishing attacks

    CISA, the NSA and MS-ISAC warned threat actors could leverage legitimate tools using help-desk themed lures. 

    By David Jones • Jan. 27, 2023
  • Concert Ticket Industry Executives Testify To Senate Hearing
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Live Nation’s IT capabilities scrutinized as company blames bots

    Senators questioned whether there was a fundamental flaw in the company's technology stack in a high-profile congressional hearing.

    By Jan. 25, 2023
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    Only half of companies have the budgets necessary to mitigate cybersecurity risks: study

    Macroeconomic pressures squeeze IT security spending, Neustar data shows.

    By David Jones • Jan. 24, 2023
  • Young woman working from home using laptop computer.
    Image attribution tooltip
    Jovan Geber via Getty Images
    Image attribution tooltip

    Top tech talent rewarded with remote work

    Software and data professions command the highest percentage of flexible work options, a Remote report shows.

    By Jan. 24, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Threat actors lure phishing victims with phony salary bumps, bonuses

    Multiple campaigns underscore threat actors’ ability to shift tactics and target employees by exploiting current events and themes.

    By Matt Kapko • Jan. 19, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Cyber, business interruption remain top global corporate risks

    Cybersecurity risk sits top of mind for corporations around the world, according to Allianz Global.

    By David Jones • Jan. 18, 2023
  • An empty chair sits in the front of a classroom. Behind the chair is a blackboard and the chair has a spotlight over it in the dark room.
    Image attribution tooltip
    Five Buck Photos via Getty Images
    Image attribution tooltip

    The cybersecurity talent shortage: The outlook for 2023

    The available potential workforce isn’t keeping pace with demand, and experts blame a lack of interest from young people entering the job market.

    By Sue Poremba • Jan. 13, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    Slack employee tokens stolen, GitHub repository breached

    The firm said a threat actor downloaded private code repositories, but none included customer data or the company’s primary code base.

    By David Jones • Jan. 5, 2023
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Rackspace executives stand by ransomware response

    Chief Product Officer Josh Prewitt said the company restored email access to more than three-quarters of its Hosted Exchange customers. 

    By David Jones • Dec. 16, 2022
  • Diverse employees team engaged in teamwork in modern boardroom
    Image attribution tooltip
    fizkes via Getty Images
    Image attribution tooltip

    What does it take to be good at cybersecurity?

    Few large enterprises meet Deloitte’s standards for high cyber maturity. The 21% at that level reap benefits not typically associated with security.

    By Matt Kapko • Dec. 13, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Fear, panic and Log4j: One year later

    Fears of catastrophic cyberattacks have thus far failed to materialize. But federal authorities stress threat actors are playing the long game.

    By David Jones • Dec. 12, 2022