Security: Page 4


  • Kemba Walden, acting national cyber director, speaks with David Levy, VP, government, nonprofit and healthcare at AWS, during a fireside chat at the AWS Summit with David
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    Hyperscalers seen as key tool in shifting balance of cyber risk

    The acting national cyber director says more oversight may be necessary, but a resilient cloud infrastructure is critical to the national cybersecurity strategy.

    By David Jones • June 12, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    Cybercriminals target C-suite, family members with sophisticated attacks

    Senior executives are being targeted for IP theft, doxxing and extortion, often through home office networks.

    By David Jones • June 7, 2023
  • Cybersecurity priorities 2020 Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive
    Image attribution tooltip
    Trendline

    Cybersecurity

    Security strategies benefit from nimbleness as companies respond to Log4j and other high-profile vulnerabilities, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs still expect cyber budget increases amid economic pressure

    Security executives continue to focus on maximizing value as they seek a more efficient and simplified security posture, according to a report from Nuspire.

    By David Jones • June 1, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip

    Palo Alto Networks teases plans for generative AI across security services

    The security vendor is taking a restrained approach to deploying generative AI products, but the company’s leaders still believe the technology will herald a major shift for cybersecurity.

    By Matt Kapko • May 31, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber resilience programs fall short on preparing workers for a crisis

    The report from Immersive Labs raises questions about whether corporate employees would know how to respond after a major cyberattack.

    By David Jones • May 30, 2023
  • Cybercriminal experts assemble in conference room.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Why and how to report a ransomware attack

    The majority of ransomware attacks go unreported, creating a blind spot that hampers response, recovery efforts and the prevention of future attacks.

    By Matt Kapko • May 19, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By May 18, 2023
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    SolarWinds turns to Infosys to accelerate SaaS shift

    The move eases the transition from on-prem to cloud-based software that was already underway, President and CEO Sudhakar Ramakrishna said.

    By May 11, 2023
  • The president joe biden stands behind a podium in front of the white house, shielding his eyes from the sun.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    White House considers ban on ransom payments, with caveats

    Experts suggest the effort, a reversal from the administration's previous stance, is fraught with complications that could cause unintended consequences.

    By Matt Kapko • May 8, 2023
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    What do CIOs and other cyber experts do to manage credentials? Hint: they don’t reuse passwords.

    By Matt Kapko • May 4, 2023
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort toward secure by design is seen as a potential game changer for software security, but may require investments and cultural changes.

    By David Jones • April 17, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    There’s a movement afoot to make tech vendors responsible for cybersecurity

    The international joint guide to secure by design encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design.

    By Matt Kapko • April 13, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an IAM system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By Matt Kapko • April 12, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks in the enterprise, creating business risk

    When an organization has little data visibility, it becomes even more vulnerable to leaks and breaches — as well as insider and external threats. 

    By Sue Poremba • April 11, 2023
  • A Samsung flag flies outside the Samsung office on August 25, 2017 in Seoul, South Korea.
    Image attribution tooltip
    Chung Sung-Jun via Getty Images
    Image attribution tooltip

    Samsung employees leaked corporate data in ChatGPT: report

    Data privacy is a concern for companies with employees using ChatGPT’s web-based interface, as input data is used to train and improve the tool.

    By April 7, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By David Jones • April 6, 2023
  • Side view of group of students coding on laptops in a computer lab
    Image attribution tooltip
    izusek via Getty Images
    Image attribution tooltip

    Upskilling, reskilling central to competing for tech talent, survey finds

    Leading organizations were more likely than their peers to put in place upskilling or reskilling initiatives, a report from NTT DATA found.

    By April 4, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines OpenAI's generative AI capabilities with Microsoft's threat intelligence and security network.

    By David Jones • March 28, 2023
  • A sign is posted in front of the Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California. Silicon Valley Bank was shut down on Friday morning by California regulators and w
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    Tech vendor risk raises vetting stakes in wake of SVB crisis

    Deposits are safe, but tech startups may no longer have access to venture debt and the lines of credit that helped fuel innovation.

    By March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 tips to counter identity and access management risks

    Many organizations rely on identity and access management tools for credential management and authentication. But these systems aren’t foolproof.

    By Matt Kapko • March 24, 2023
  • In this photo illustration, the home page for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    ChatGPT bug underlines need to limit shadow IT

    If you share information with the tool, you do so at your own risk, according to experts.

    By March 23, 2023
  • Federal Trade Commission Chair Lina Khan listens as U.S. President Joe Biden delivers remarks on the economy in the Eisenhower Executive Office Building on October 26, 2022 in Washington, DC.
    Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    FTC opens inquiry into cloud market competition, security

    As consolidation among hyperscalers grows, federal authorities are raising concerns over cloud dependence in critical sectors.

    By March 22, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By Matt Kapko • March 22, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. announced plans to shift liability for weak product security onto the tech industry.

    By David Jones • March 21, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Workforce reductions hinder tech upskilling: report

    As layoffs and hiring freezes reach tech companies, funding and scheduling training becomes a problem, a Pluralsight report found.

    By March 20, 2023