Security: Page 20
-
The image by hendricks is licensed under CC BY-SA 3.0
Goldman hires CISO away from Morgan Stanley
In a case of executive shuffle, Matthew Chung is leaving to join Goldman Sachs in a role vacated in May when Andy Ozment moved to Capital One.
By Dan Ennis • Updated Oct. 2, 2020 -
Malicious domains are floating around the cloud: Here's the threat to companies
More than 56,200 newly-registered domain names were hosted by AWS, Google Cloud, Microsoft Azure and Alibaba, according to research from Palo Alto Networks' Unit 42.
By Samantha Schwartz • May 4, 2020 -
Hasty Office 365 deployments wrought with security configuration holes
With work from home orders, companies rushed cloud-based collaboration service deployments. They could undermine any existing Office 365 security strategy, CISA warns.
By Samantha Schwartz • May 1, 2020 -
3 years, 3 cyberattacks on major ocean carriers. How can shippers protect themselves?
Shippers and freight forwarders have a role to play in vetting supply chain partners' risks and keeping their data and cargo safe.
By Shefali Kapadia • April 30, 2020 -
Column
The Remote Playbook: Logged on at home, employees are an attacker's dream
The pandemic makes each remote worker a weak link. Ensuring company-wide adherence to policies can protect sensitive company data.
By Roberto Torres • April 30, 2020 -
With Cognizant attack, Maze ransomware finds its way into IT services supply chain
Maze encrypts and infiltrates files simultaneously, a signature move of the operators. It holds onto valuable data to later publicly publish online.
By Samantha Schwartz • April 23, 2020 -
Who is responsible for securing the home network?
Companies should not expect all of their employees to be IT people; nor should companies overwhelm those suddenly working from home with a long list of security mandates.
By Jen A. Miller • April 23, 2020 -
Opinion
Why CIOs should make DevSecOps a priority during the COVID-19 crisis
Companies around the world are increasing capacity and taking the opportunity to look again at their DevOps processes and build in security from the ground up.
By Samuel Bocetta • April 21, 2020 -
Cognizant hit by Maze ransomware attack, client services disrupted
Maze is an influential piece of ransomware, and other strains copy its modus operandi: encrypt, steal and publish data.
By Samantha Schwartz • April 20, 2020 -
'Ancient' Internet Explorer 6 a ripe cyberattack target this year
Hacking is a time-consuming activity, requiring trial and error. As a shortcut, "relatively unsophisticated hackers" can download exploits at will, said Cloudflare CTO John Graham-Cumming.
By Samantha Schwartz • April 20, 2020 -
Zero trust isn't a temporary band-aid for remote security
The coronavirus outbreak and the work-from-home model obliterated a secure perimeter. With business data everywhere, zero trust is what's left.
By Samantha Schwartz • April 16, 2020 -
Some hackers are getting lazy
Palo Alto Networks' Unit 42 found ransomware written by bad actors who failed "to make their lures appear legitimate in any way."
By Samantha Schwartz • April 14, 2020 -
Travelex paid the ransom, breach investigation still underway: report
After discovering the attack, the company took down its websites globally to contain the spread of the virus.
By Samantha Schwartz • April 9, 2020 -
Yes, developers break cloud security rules. But do companies have adequate policies in place?
Even though developers are circumventing compliance policies, companies struggle with adopting guidelines altogether.
By Samantha Schwartz • April 9, 2020 -
Coronavirus chaos ripe for hackers to exploit medical device vulnerabilities
As crowded hospital emergency rooms and ICUs in major U.S. cities try to keep up with demand for medical services, their networks face a rising threat level from cybercriminals probing for weaknesses.
By Greg Slabodkin • April 9, 2020 -
Retrieved from Zoom on April 03, 2020
Zoom's no good, very rotten week: What's next in its security plans
It might be tempting to believe Zoom's flaws were intentionally hidden, it's more likely popularity brought scrutiny — something all prominent technologies eventually bear.
By Samantha Schwartz • April 9, 2020 -
Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
FBI warns of a phishing uptick as hackers latch on to coronavirus
Bad actors are leveraging business email compromise schemes to target "municipalities purchasing protective equipment" and supplies related to the coronavirus response.
By Samantha Schwartz • April 8, 2020 -
Zoom's privacy woes lead back to end-to-end encryption
"We did not design the product with the foresight that, in a matter of weeks, every person in the world would suddenly be working, studying, and socializing from home," wrote CEO Eric Yuan.
By Samantha Schwartz • April 2, 2020 -
Sponsored by Coder
Keeping software development secure and productive in a work from home mandate
Many organizations have implemented remote work policies to protect their employees. As unexpected business disruptions emerge, Coder provides the solution software engineers need.
April 2, 2020 -
"200323-Z-NI803-0587" by New Jersey National Guard is licensed under CC BY-ND 2.0
Is coronavirus putting privacy on hold?
The pandemic creates a gray area between helping the greater good and loosening data privacy expectations.
By Samantha Schwartz • April 1, 2020 -
Retrieved from Marriott on December 03, 2018
Marriott International's latest data breach hits 5.2M guests
The hotel chain found the intrusion at the end of February and believes it began mid-January, according to the announcement.
By Samantha Schwartz • March 31, 2020 -
Coronavirus phishing attacks up 667% since February, research finds
Spring is typically the time of year bad actors send tax-related phishing emails, but this year they are leveraging human fear and health.
By Samantha Schwartz • March 26, 2020 -
Ransomware hits healthcare hardest, preys on SMBs
More attacks are moving past locking systems to breaching victims' data. And while restoring systems, targets may unintentionally wipe forensic evidence determining if data was stolen.
By Samantha Schwartz • March 25, 2020 -
DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
As Zoom meetings surge, beware digital gate-crashers
The security of a video conference call extends beyond keeping bad actors from crashing it.
By Samantha Schwartz • March 24, 2020 -
National Institute of Allergy and Infectious Diseases. (2020). "Novel Coronavirus SARS-CoV-2" [Image]. Retrieved from https://www.flickr.com/photos/nihgov/49565892277/in/album-72157713108522106/.
Report: Medical company set to aid coronavirus response struck by ransomware
A U.K.-based medical research firm discovered an attack and restored systems, but the attackers still published stolen data.
By Samantha Schwartz • March 23, 2020