Security: Page 10


  • Cybercriminal experts assemble in conference room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Why and how to report a ransomware attack

    The majority of ransomware attacks go unreported, creating a blind spot that hampers response, recovery efforts and the prevention of future attacks.

    By Matt Kapko • May 19, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By Matt Ashare • May 18, 2023
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SolarWinds turns to Infosys to accelerate SaaS shift

    The move eases the transition from on-prem to cloud-based software that was already underway, President and CEO Sudhakar Ramakrishna said.

    By Matt Ashare • May 11, 2023
  • The president joe biden stands behind a podium in front of the white house, shielding his eyes from the sun.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House considers ban on ransom payments, with caveats

    Experts suggest the effort, a reversal from the administration's previous stance, is fraught with complications that could cause unintended consequences.

    By Matt Kapko • May 8, 2023
  • Password input field
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    What do CIOs and other cyber experts do to manage credentials? Hint: they don’t reuse passwords.

    By Matt Kapko • May 4, 2023
  • legal processes
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort toward secure by design is seen as a potential game changer for software security, but may require investments and cultural changes.

    By David Jones • April 17, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    There’s a movement afoot to make tech vendors responsible for cybersecurity

    The international joint guide to secure by design encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design.

    By Matt Kapko • April 13, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an IAM system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By Matt Kapko • April 12, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Leftover data lurks in the enterprise, creating business risk

    When an organization has little data visibility, it becomes even more vulnerable to leaks and breaches — as well as insider and external threats. 

    By Sue Poremba • April 11, 2023
  • A Samsung flag flies outside the Samsung office on August 25, 2017 in Seoul, South Korea.
    Image attribution tooltip
    Chung Sung-Jun via Getty Images
    Image attribution tooltip

    Samsung employees leaked corporate data in ChatGPT: report

    Data privacy is a concern for companies with employees using ChatGPT’s web-based interface, as input data is used to train and improve the tool.

    By April 7, 2023
  • Trade secrets
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By David Jones • April 6, 2023
  • Side view of group of students coding on laptops in a computer lab
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Upskilling, reskilling central to competing for tech talent, survey finds

    Leading organizations were more likely than their peers to put in place upskilling or reskilling initiatives, a report from NTT DATA found.

    By April 4, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines OpenAI's generative AI capabilities with Microsoft's threat intelligence and security network.

    By David Jones • March 28, 2023
  • A sign is posted in front of the Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California. Silicon Valley Bank was shut down on Friday morning by California regulators and w
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    Tech vendor risk raises vetting stakes in wake of SVB crisis

    Deposits are safe, but tech startups may no longer have access to venture debt and the lines of credit that helped fuel innovation.

    By Matt Ashare • March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    5 tips to counter identity and access management risks

    Many organizations rely on identity and access management tools for credential management and authentication. But these systems aren’t foolproof.

    By Matt Kapko • March 24, 2023
  • In this photo illustration, the home page for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    ChatGPT bug underlines need to limit shadow IT

    If you share information with the tool, you do so at your own risk, according to experts.

    By March 23, 2023
  • Federal Trade Commission Chair Lina Khan listens as U.S. President Joe Biden delivers remarks on the economy in the Eisenhower Executive Office Building on October 26, 2022 in Washington, DC.
    Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    FTC opens inquiry into cloud market competition, security

    As consolidation among hyperscalers grows, federal authorities are raising concerns over cloud dependence in critical sectors.

    By Matt Ashare • March 22, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By Matt Kapko • March 22, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. announced plans to shift liability for weak product security onto the tech industry.

    By David Jones • March 21, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Workforce reductions hinder tech upskilling: report

    As layoffs and hiring freezes reach tech companies, funding and scheduling training becomes a problem, a Pluralsight report found.

    By Matt Ashare • March 20, 2023
  • Silhouette of teams playing tug of war
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity market confronts potential consequences of banking crisis

    Bank seizures impose new challenges on vendors in every segment — and may spur consolidation.

    By Matt Kapko • March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    Threat hunters and security executives warned organizations to look out for malicious activity as regulators step in to operate Silicon Valley Bank.

    By Matt Kapko • March 15, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By Matt Kapko • March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By Matt Kapko • March 6, 2023
  • Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies.
    Image attribution tooltip
    Permission granted by Office of the National Cyber Director
    Image attribution tooltip

    The US cyber strategy is out. Now, officials just have to implement it

    Industry stakeholders signal a willingness to discuss further steps, while congressional leaders hint additional action may be on the table.

    By David Jones • March 3, 2023