Security: Page 2

  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images

    Where 5 programs are investing to close cyber skills gap

    In line with a White House push to close the cyber skills gap, technology firms, nonprofits and other organizations have launched a range of programs to develop a new generation of workers.

    By David Jones • July 26, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images

    Threat actors use Google Drive, Dropbox to launch cyberattacks

    By using trusted applications, threat actors gain a low-cost way to collect data and host malware, Unit 42 researchers said.

    By David Jones • July 20, 2022
  • Cybersecurity priorities 2020 Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive


    Security strategies benefit from nimbleness as companies respond to Log4j and other high-profile vulnerabilities, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images

    Fake GitHub commits can trick developers into using malicious code

    Threat actors can easily alter the identity and timestamp associated with software updates, putting developers at serious risk, Checkmarx research shows.

    By Matt Kapko • July 18, 2022
  • Golden circuit cloud showing cloud computing technology
    Image attribution tooltip
    PhonlamaiPhoto via Getty Images

    5 experts demystify post-cloud migration challenges

    Businesses must think about what comes after cloud migration and prepare for the challenges that arise once workloads are transferred.

    By July 15, 2022
  • The U.S. Capitol Building at night with lightning in the background.
    Image attribution tooltip
    Naomi Eide/CIO Dive

    Log4j is far from over, cyber review board says

    Exploitation of Log4j occurred at lower levels than experts predicted, yet it remains an "endemic vulnerability," the Cyber Safety Review Board said.

    By July 14, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images

    Latest Marriott breach shows a human error pattern

    The latest incident at the hotel chain is relatively minor compared to major breaches in late 2018 and early 2020, but it signals a pattern of neglect.

    By Matt Kapko • July 7, 2022
  • A conference room equipped with laptops in a modern panoramic office.
    Image attribution tooltip
    ismagilov via Getty Images

    Cybersecurity expertise creeps onto Fortune 500 boards

    Companies are trusting technology experts to advise on cybersecurity and regulatory pressures from the board’s perspective.

    By Barbara DeLollis • July 6, 2022
  • A diverse group of executives talking in meeting room.
    Image attribution tooltip
    FangXiaNuo via Getty Images

    CISO priorities for the second half of 2022

    Security executives from Zoom, NS1 and Oomnitza shared their security priorities for the rest of 2022, with a special emphasis on mastering the basics. 

    By Sue Poremba • July 5, 2022
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images

    Is your remote IT job candidate legit?

    Organizations are seeing a rise in deepfakes and stolen identities during the job application process, the FBI said.

    By June 29, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images

    Organizations lag on confidence and policies to manage open source security

    It's taking longer for companies to find open source vulnerabilities, and shaky policies mean only the most critical flaws are attended to. 

    By David Jones • June 24, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images

    Analysts nudge businesses to decentralize cybersecurity leadership

    The push is to enable employees to make informed security decisions while meeting enterprise needs with spread out security leadership. 

    By June 22, 2022
  • Software building
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    What enterprise leaders can divine from software bills of materials

    Cyber defense tool: Software bills of materials (SBOMs) can expose elements of risks in applications.

    By June 13, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can companies keep up with the accelerated pace and scale of cyber threats?

    By Matt Kapko • June 13, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Organizational changes required to mitigate security risks

    CIOs are implementing new strategies to lower software supply chain risk, but evaluating internal operations could prove more effective.

    By June 7, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images

    Attackers aim for Atlassian Confluence zero day with mass, targeted exploitation

    The threat activity comes days after the company released a security fix for the on-premise vulnerability.

    By David Jones • June 7, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images

    Microsoft Office zero day leaves researchers scrambling over the holiday weekend

    The company warns a successful attack could allow an attacker to install programs, delete data or create new accounts. 

    By David Jones • Updated May 31, 2022
  • A lightbulb with a cycle circle around it.
    Image attribution tooltip
    Permission granted by Gartner
    Sponsored by Gartner Peer Insights

    Cybersecurity quarterly benchmarks: Q1, 2022

    Gartner Peer Insights data and opinions run the gamut on cybersecurity maturity, budgets, and initiatives.

    May 23, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images

    Critical VMware vulnerabilities resurface after threat actors evade patches within 48 hours

    Even with new patches available, CISA is concerned that threat actors will easily shake off the fixes once again.

    By Matt Kapko • May 19, 2022
  • A stock image of a calculator alongside financial numbers
    Image attribution tooltip
    atiatiati via Getty Images

    What cyber insurance companies want from clients

    Insurers evaluate how a company leverages technology and what internal standards are in place to manage risk.

    By Sue Poremba • April 28, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies. 

    By Brian Eastwood • April 25, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images

    Threat detection accelerates in Asia, Europe, as notification trends shift

    As companies boost defenses and share threat intelligence, malicious actors have less time to escalate attacks.

    By David Jones • April 19, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images

    2 years later: What's next in security for the pandemic-era workforce

    Organizations can expect the return-to-work model to stress a corporate infrastructure that has languished in recent years. 

    By Sue Poremba • April 13, 2022
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images

    Federal authorities urged to bolster intel sharing amid nation-state threats

    Current Russian cyber activity has been limited, but experts called on federal authorities to keep providing actionable intelligence as risks endure.

    By David Jones • April 6, 2022
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    Big tech is fixing bugs faster. Will that influence trickle down?

    If a customer lacks urgency in deploying a patch, a flaw can linger. 

    By Sue Poremba • April 1, 2022
  • Image attribution tooltip
    sakkmesterke via Getty Images
    Sponsored by Hyperproof

    The security challenge for 2022: Operating under a continuous assurance model

    Companies are turning to continuous assurance to answer increased compliance maturity expectations.

    March 28, 2022