Security: Page 16


  • Image attribution tooltip
    DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
    Image attribution tooltip

    Cyberthreat trends in the remote work landscape

    With more workers logging in from home, companies face new cybersecurity challenges and opportunities.

    By David Jones • Jan. 25, 2021
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Financial services companies embrace cloud as security concerns grow

    Equifax CISO and a study from Nutanix address how investing in cloud security helps to protect sensitive financial data.

    By David Jones • Jan. 15, 2021
  • person uses a cellphone and laptop
    Image attribution tooltip
    thanyakij, bongkarn. (2019). Retrieved from Pexels.
    Image attribution tooltip

    Poor software quality cost businesses $2 trillion last year and put security at risk

    The COVID-19 pandemic played a role in the rise of operational software failure, the report author says.

    By Jan. 7, 2021
  • Sponsored
    Image attribution tooltip

    ThisisEngineering RAEng/Unsplash

    Image attribution tooltip
    Sponsored by AppDynamics

    Is your business ready for digital experience monitoring?

    By 2025, IT teams will have to report UX metrics for 70% of technology efforts. Are you ready?

    By Wei Li • Dec. 21, 2020
  • new orleans
    Image attribution tooltip
    Williams, Antrell. (2015). "New Orleans Skyline" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    New Orleans leaders share lessons from 2019 cyberattack

    CIO Kimberly LaGrue said early and intensive preparations were key to preventing disaster and recovering without paying a ransom to the hackers.

    By Chris Teale • Dec. 18, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    What the SolarWinds compromise means for IT

    A renewed awareness of IT supply chain risks emerged from the attack. CIOs now seek more visibility into the inner workings of their providers.

    By Dec. 17, 2020
  • IT execs face growing pressure to balance security with productivity

    Companies are caught between competing interests as remote workers offset digital security needs with work-life balance.

    By David Jones • Dec. 14, 2020
  • Johnson & Johnson, credo wall
    Image attribution tooltip
    Permission granted by Johnson & Johnson
    Image attribution tooltip
    Dive Awards

    CISO of the Year: Marene Allison, Johnson & Johnson

    In a year of uncertainty, J&J's security mission remained a constant. Under Allison's leadership, the company's resilience has been a decade in the making. 

    By Samantha Schwartz • Dec. 9, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    5 state ballot initiatives to watch in 2020: results

    Data and privacy took center stage across state ballots this year, changing how businesses are required to operate.

    By Updated Nov. 5, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Why is the CIO-CISO dynamic strained?

    In an enterprise where every executive has competing priorities in deadlines, money and personnel, some CISOs and CIOs fight for equal shares. 

    By Samantha Schwartz • Oct. 27, 2020
  • Gary Brantley, CIO of the City of Atlanta
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip

    How Atlanta's CIO rebuilt IT after the city's cyberattack — and what's next

    Inheriting a city technologically and economically wounded by a cyberattack, Gary Brantley had to turn to the basics.

    By Samantha Schwartz • Oct. 20, 2020
  • Transit agencies 'ill prepared' for cyberattack: survey

    Only 60% of agencies have a cybersecurity plan in place and 43% say their plan is insufficient, according to the Mineta Transportation Institute.

    By Chris Teale • Oct. 14, 2020
  • Treasury threatens fines for ransomware payments

    The math problem organizations were solving for — does recovery cost less than the ransom — must now factor in an unknown quantity: fines.

    By Samantha Schwartz • Oct. 2, 2020
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip

    Slack picks Reddit alum as chief security officer

    The company named its first CSO Geoff Belknap in 2016, but Larkin Ryder has been serving as Slack's interim CSO since Belknap departed in 2019. 

    By Samantha Schwartz • Oct. 1, 2020
  • Major ocean carrier suspects malware attack led to data breach

    CMA CGM said its back offices are being reconnected to the network, which will improve bookings and document processing time.

    By Matt Leonard • Updated Sept. 30, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Security experts overlook attacker-favored credential stuffing

    With an endless cycle of breaches, hackers have a large pool of exposed credentials to throw at websites, increasing their probability of success. 

    By Samantha Schwartz • Sept. 30, 2020
  • UHS
    Image attribution tooltip

    UHS

    Image attribution tooltip

    UHS hit with ransomware attack, working to restore IT operations

    The for-profit owner of around 400 hospitals is struggling to contain the ripple effects of a cyberattack that locked it out of computer and phone systems.

    By Rebecca Pifer • Sept. 29, 2020
  • How global companies factor their supply chain into data protection, privacy

    International Paper purposefully duplicates technologies to comply with international laws, from one vendor to another.

    By Samantha Schwartz • Sept. 25, 2020
  • Image attribution tooltip
    Shopify
    Image attribution tooltip

    'Rogue' employees caused Shopify's data breach. What makes an insider a threat?

    Coinciding crises are contributing to "a perfect storm for malicious insiders," Forrester's Joseph Blankenship says.

    By Samantha Schwartz • Sept. 24, 2020
  • How to negotiate software costs as IT budgets are slashed

    If vendors can't provide a degree of flexibility, abandon the deal, according to Paul McKay, senior analyst at Forrester.

    By Samantha Schwartz • Sept. 23, 2020
  • 6 types of CISO and the companies they thrive in

    Jeff Pollard, VP and principal analyst at Forrester, wants CISOs to discover the type of leader they are — transformational, tactical, steady — and run with it.

    By Samantha Schwartz • Sept. 22, 2020
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    How cloud threat protection takes on shadow IT

    Cloud access security broker capabilities — discovery, data loss prevention, threat protection, encryption, logging — should sit between every kind of app a company houses.

    By Samantha Schwartz • Sept. 21, 2020
  • What security needs to know before diving into SaaS contracts

    If employees don't engage with security red flags, the agreement fails to address the underlying issue: an application outside of a company's risk appetite.

    By Samantha Schwartz • Sept. 18, 2020
  • Data doesn't speak for itself: 4 benefits of giving security metrics context

    When presenting security metrics and data to non-technical stakeholders, security leaders' messaging could get lost in translation.

    By Samantha Schwartz • Sept. 17, 2020
  • Security pushes DevOps to breaking point

    The future of DevOps is "going to break application security," said Dale Gardner, research director at Gartner.

    By Samantha Schwartz • Sept. 16, 2020