Security: Page 10


  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Multifactor authentication is not all it’s cracked up to be

    MFA is only as strong as the weakest link in the supply chain — and the resilience of each individual using it.

    By Matt Kapko • Oct. 6, 2022
  • Tenable logo on a wall
    Image attribution tooltip
    Permission granted by Tenable
    Image attribution tooltip

    Tenable’s CIO pushes resource optimization as company pursues $1B in revenue

    Technology veteran Patricia Grant is joining the cybersecurity company amid sustained industry growth. Her challenge now is to help Tenable scale.

    By Oct. 5, 2022
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop. Explore the Trendline
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip
    Trendline

    IT Security

    Security strategies benefit from nimbleness as companies respond to high-profile vulnerabilities and support internal talent gaps.

    By CIO Dive staff
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    C-suite, boards are prioritizing cybersecurity, but still expect increased threats

    Senior executives are taking risk management more seriously, PwC found. But many are still concerned about business resilience.

    By David Jones • Oct. 4, 2022
  • Padlock on credit cards and us dollars.
    Image attribution tooltip
    baona via Getty Images
    Image attribution tooltip

    Security to take an outsized role in IT spending in 2023

    Modernization has taught companies that cyber spend is a smart investment.

    By Oct. 4, 2022
  • A picture of the Microsoft campus in Redmond, Washington.
    Image attribution tooltip
    Stephen Brashear/Stringer via Getty Images
    Image attribution tooltip

    Microsoft investigating 2 zero-day vulnerabilities in Exchange Server

    One vulnerability is a server-side request forgery, while the second allows remote-code execution when an attacker has access to PowerShell. 

    By David Jones • Sept. 30, 2022
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft’s CISO on why cloud matters for security response

    Cloud can give companies insight into current and future threats as the landscape grows more complex, said Bret Arsenault.

    By Sept. 29, 2022
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    piranka via Getty Images
    Image attribution tooltip

    Today’s top cybersecurity concerns — and what comes next

    Cybersecurity executives are up against talent shortages and retention concerns amid increasingly sophisticated threats.

    By Sue Poremba • Sept. 27, 2022
  • The Microsoft logo is displayed outside the Microsoft Technology Center near Times Square.
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Cloud collaboration market boom is good news for Microsoft

    With hybrid work entrenched and data security a looming concern, IT spend on collaboration bodes well for the No. 2 infrastructure cloud provider.

    By Sept. 23, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys data shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By David Jones • Sept. 22, 2022
  • Golden circuit cloud showing cloud computing technology
    Image attribution tooltip
    PhonlamaiPhoto via Getty Images
    Image attribution tooltip

    Cloud security pros expect elevated risk for serious data breaches

    Just one out of five cybersecurity and engineering professionals escaped the previous year without incident.

    By Matt Kapko • Sept. 19, 2022
  • An image of the White House.
    Image attribution tooltip
    Vacclav/iStock via Getty Images
    Image attribution tooltip

    White House guidance on third-party software tests cyber risk strategy

    The U.S. hopes that pushing software makers toward minimum security standards for federal use, a new baseline strategy will emerge industrywide.

    By David Jones • Sept. 19, 2022
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    ‘Shift-left’ software strategy challenged by security and compliance

    Developer burnout and supply chain concerns mount as companies push to begin software testing early in the development process.

    By Sept. 15, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Security vendor consolidation a priority for majority of organizations worldwide

    More organizations want to reduce the complexity of their security stacks, Gartner reserach shows.

    By David Jones • Sept. 14, 2022
  • General view of the Etro Fashion Show during Metaverse Fashion Week on March 25, 2022
    Image attribution tooltip
    Vittorio Zunino Celotto / Staff via Getty Images
    Image attribution tooltip

    The metaverse joins the list of enterprise IT maybes

    Securing, operationalizing and defining the metaverse are three challenges to wide adoption. Inventing the metaverse is another. 

    By Sept. 9, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By David Jones • Sept. 9, 2022
  • Man working at home on computer with pen.
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    Highest-paid IT certifications show the clout of data skills

    Cyber and cloud remain high on the list of top-paying credentials, but ROI for data certifications reflects increased need for data engineers, scientists and analysts.

    By Sept. 9, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Most organizations remain unprepared for ransomware attacks

    Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.

    By Matt Kapko • Sept. 7, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    SaaS sprawl amps up security challenges amid heightened risk

    Two-thirds of businesses say they're spending more on SaaS applications year over year, Axonius data shows.

    By Aug. 31, 2022
  • A screen with the Slack logo on the trading floor of the New York Stock Exchange.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Slack enhances platform security amid rapid expansion and heightened risk

    The enterprise messaging platform has faced increased customer concerns about security and privacy.

    By David Jones • Aug. 31, 2022
  • Lloyd's employee at company headquarters
    Image attribution tooltip
    Matt Cardy via Getty Images
    Image attribution tooltip

    Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil

    Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable. 

    By David Jones • Aug. 31, 2022
  • A trader sits at a computer in front of a wall of screens displaying stock informations at the New York Stock Exchange.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Cybersecurity spending strategies in uncertain economic times

    The need for strong cybersecurity programs doesn’t make it immune to cuts.

    By Sue Poremba • Aug. 26, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Risk of cyberattack emerges as top concern of US executives

    PwC research shows cyber risk is a top concern among entire C-suite and corporate boards as companies spend more to boost resilience.

    By David Jones • Aug. 22, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By David Jones • Aug. 18, 2022
  • CISO salaries balloon, likely spurred by demand

    Tenure matters, but not as you might suspect. Median total cash compensation fell for CISOs who have been in their roles at least five years, Heidrick & Struggles found. 

    By Naomi Eide • Aug. 18, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Zero trust skyrockets, nearing universal adoption

    A report from Okta shows organizations fully embracing zero-trust principles, as hybrid work requires long-term changes to identity management. 

    By David Jones • Aug. 16, 2022