Security


  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cybersecurity jobs pay well, but gender disparities persist

    ISC2’s analysis found significant financial benefits for U.S. cybersecurity professionals, but pay gaps persist across levels of seniority by gender.

    By Matt Kapko • April 12, 2024
  • Microsoft logo is seen in the background.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft Exchange state-linked hack entirely preventable, cyber review board finds

    The technology giant’s corporate culture fell short on security investments and risk management, and needs significant reforms, according to a damning report by the U.S. Cyber Safety Review Board.

    By David Jones • April 3, 2024
  • Cybersecurity priorities 2020 Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive
    Image attribution tooltip
    Trendline

    Cybersecurity

    Security strategies benefit from nimbleness as companies respond to Log4j and other high-profile vulnerabilities, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Threat groups hit enterprise software, network infrastructure hard in 2023

    Actively exploited high-risk vulnerabilities rose threefold in enterprise software and network infrastructure, according to Recorded Future.

    By Matt Kapko • March 25, 2024
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    How CIOs can infuse security into generative AI adoption

    As the AI ecosystem grows and more tools connect to internal data, threat actors have a wider field to introduce vulnerabilities.

    By March 21, 2024
  • Photo illustration of a VF Corp. SEC filing.
    Image attribution tooltip

    Photo illustration: Industry Dive; US Securities and Exchange Commission

    Image attribution tooltip

    How companies describe cyber incidents in SEC filings

    The words businesses use in cybersecurity disclosures matter. They can channel confidence in the recovery process, potential impacts and legal liabilities.

    By Matt Kapko • March 21, 2024
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    3 months into cyber disclosure rules, what’s material to the SEC?

    As attacks become more sophisticated and destructive, companies are struggling to find conclusive estimates of the financial impact of cyberattacks.

    By David Jones • March 19, 2024
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    White House adds teeth to secure software development requirements

    The guidelines are designed to ensure software producers working with the U.S. government comply with standards for secure development.

    By David Jones • March 15, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip

    Cloud intrusions spiked 75% in 2023, CrowdStrike says

    Threat actors took advantage of inconsistent cloud security structures, abusing unique features of the technology to initiate attacks.

    By Matt Kapko • Feb. 26, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    National cyber director urges private sector collaboration to counter nation-state cyber threat

    The Biden administration is exploring plans to hold manufacturers accountable for poor security while also working to harmonize regulations, the official said.

    By David Jones • Feb. 13, 2024
  • The White House in Washington DC at summer day.
    Image attribution tooltip
    lucky-photographer via Getty Images
    Image attribution tooltip

    What to know about the 200-member AI safety alliance

    The alliance aims to support "the development and deployment of safe and trustworthy artificial intelligence," the U.S. Department of Commerce said.

    By Feb. 8, 2024
  • IT workers code in office
    Image attribution tooltip
    AnnaStills via Getty Images
    Image attribution tooltip

    AI-generated code leads to security issues for most businesses: report

    More than three-quarters of developers bypass established protocols to use code completion tools despite potential risks, Snyk’s research found. 

    By Jan. 29, 2024
  • Microsoft's visitor center at its Redmond campus.
    Image attribution tooltip
    Stephen Brashear via Getty Images
    Image attribution tooltip

    Midnight Blizzard attack seen as another sign of Microsoft falling short on security

    Critics say the hack of senior Microsoft executives’ emails is another example of a longstanding series of security lapses and foot-dragging by the company.

    By David Jones • Jan. 26, 2024
  • Satya Nadella, CEO of Microsoft, speaks to the media about a joint project called the Volkswagen Automotive Cloud on February 27, 2019 in Berlin, Germany
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft to overhaul internal security practices after Midnight Blizzard attack

    After the company disclosed a Russia-affiliated threat actor stole data from senior executives, experts are raising questions about its security capabilities and practices.

    By David Jones • Jan. 22, 2024
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Cyber tops business risk for enterprises worldwide, report finds

    Worries over cybersecurity replaced business interruption as the top concern among U.S. businesses, according to the Allianz Risk Barometer.

    By David Jones • Jan. 17, 2024
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass enforces 12-character master password lengths

    The password manager enforced its guidance on master password complexity nearly a year and a half after a major cyberattack.

    By Matt Kapko • Jan. 5, 2024
  • Photograph of a man conducting a seminar on Python computer coding in an open plan work arena.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    CompTIA bolsters training portfolio, adds AI fundamentals and AWS pro certs

    The rollout will include new cybersecurity, data science and full-stack credentials and refresh five existing certification programs.

    By Jan. 3, 2024
  • Silhouette of several business people at a conference room table.
    Image attribution tooltip
    FangXiaNuo via Getty Images
    Image attribution tooltip

    Cyber risk strategies in hot seat as SEC rules go live

    Shifts in regulatory scrutiny are pushing companies to reassess cyber governance and mitigation at the highest levels.

    By David Jones • Dec. 22, 2023
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    What the SEC weighed as it finalized its cyber disclosure rules

    Compliance costs and a company’s need to remediate security incidents shaped the SEC’s final guidance.

    By David Jones • Dec. 19, 2023
  • Coin stacks and blue bar and line graphs on black background.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Challenging the ‘good enough’ cybersecurity mindset

    The volume of cyber threats keeps growing, pushing companies to reevaluate the adequacy of existing resources.

    By Dec. 8, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    Authorities pushing for secure AI development practices

    The guidelines are part of a global effort to ensure AI is developed using security as a core component.

    By David Jones • Nov. 29, 2023
  • two technologists looking at a laptop inside a server room
    Image attribution tooltip
    Jacob Wackerhausen via Getty Images
    Image attribution tooltip

    MSPs ready to support SEC cyber disclosure requirements

    With a line of sight on security operations, MSPs hold keys to materiality determinations and annual 10-K reports.

    By Suman Bhattacharyya • Nov. 28, 2023
  • Attendees arrive during AWS re:Invent 2021, a conference hosted by Amazon Web Services, at The Venetian Las Vegas on November 30, 2021 in Las Vegas, Nevada.
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images
    Image attribution tooltip

    Cloud security myths can leave SMBs exposed

    AWS identified three cyber misconceptions that hinder small- and medium-sized businesses as they migrate workloads.

    By Nov. 22, 2023
  • Black Friday weekend 25% off discount banner in a boutique.
    Image attribution tooltip
    Shaun Taylor via Getty Images
    Image attribution tooltip

    Retailers brace for cyberthreat feast ahead of Thanksgiving shopping weekend

    A rise in social engineering and generative AI pose increased risks as phishing attacks and ransomware gain speed and grow more sophisticated.

    By David Jones • Nov. 22, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA explains how to apply secure-by-design principles

    The focus should be on what manufacturers are doing to keep their customers safe, not the damage attackers might be inflicting, CISA’s Bob Lord said. 

    By Matt Kapko • Nov. 21, 2023
  • Federal Trade Commission Chair Lina Khan speaks during a discussion on antitrust reforms at the Brookings Institution October 4, 2023 in Washington, DC.
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    FTC extends cloud competition scrutiny to generative AI

    “Cloud computing is a key input for artificial intelligence technologies,” FTC Chair Lina Khan said. 

    By Nov. 20, 2023