Security: Page 20


  • Image attribution tooltip
    Wikimedia Commons
    Image attribution tooltip

    Even Pentagon IT leaders want more telework post-pandemic

    The Pentagon has been slow to adopt the cloud and famously reliant on floppy disks. Shifting to remote work upended traditional IT security practices.

    By Samantha Schwartz • July 2, 2020
  • Image attribution tooltip
    "200323-Z-NI803-0587" by New Jersey National Guard is licensed under CC BY-ND 2.0
    Image attribution tooltip

    Ransomware vs. healthcare: How the pandemic added to a cyber crisis

    Maze was responsible for at least six ransomware attacks this year and NetWalker was responsible for at least five, according to Recorded Future. 

    By Samantha Schwartz • June 30, 2020
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip
    Opinion

    A Microsoft bug detection breakthrough has its drawbacks: undetected flaws

    Although an accuracy level of 99% sounds great, given the scale that Microsoft is working on this still leaves a huge number of bugs misidentified — 3,000 a month, in fact. 

    By Samuel Bocetta • June 29, 2020
  • Image attribution tooltip

    Coder

    Image attribution tooltip
    Sponsored by Coder

    DevSecOps in government: Enabling secure productivity during a pandemic

    Security continues to be a core focus for all software tools. You need the right strategy to avoid negatively impacting the quality of the code nor the ability to deliver products quickly.

    By Jeff Mironcow • June 29, 2020
  • First came communication platform adoption. Now it's time for strategy

    Between technology vision and employee demand, CIOs are confronted with a new challenge: preserving employee well-being. 

    By Samantha Schwartz • June 26, 2020
  • Going remote, employee productivity hampered by password lockouts, app access

    Working through the global crisis highlighted gaps in IT, allowing companies to become more aware of the challenges they face amid disruption.

    By June 25, 2020
  • Zoom
    Image attribution tooltip
    Retrieved from Zoom on April 03, 2020
    Image attribution tooltip

    Former Salesforce exec joins Zoom as CISO

    As Jason Lee takes over security at Zoom, the company is ending its 90-day security and privacy plan, which it put in place following highly publicized flaws in March. 

    By Samantha Schwartz • June 25, 2020
  • Businesses to spend more on security as the number, size of cyberattacks grow

    Security strategies are changing as COVID-19's disruption threatens an increase in insider threats and challenges identifying the location of malicious activity.

    By Samantha Schwartz • June 24, 2020
  • 3 healthcare CISOs tackled telehealth at hyper speed — they wish they were faster

    Telehealth is a years-long pursuit for healthcare organizations. But like other digital transformation efforts, COVID-19 accelerated it. 

    By Samantha Schwartz • June 23, 2020
  • Image attribution tooltip
    Retrieved from Pixabay.
    Image attribution tooltip

    Gartner shrinks infosec spending forecast for 2020, cloud security gets COVID-19 boost

    Certain areas of cybersecurity are "supported" by stay-at-home orders, including VPNs and firewalls, endpoint protection platforms, cloud security and secure web gateways. 

    By Samantha Schwartz • June 19, 2020
  • Zoom
    Image attribution tooltip
    Retrieved from Zoom on April 03, 2020
    Image attribution tooltip

    Following scrutiny, Zoom enables end-to-end encryption to all users

    Available as technical preview, the feature uses 256-bit AES-GCM encryption, the same encryption used by default in meetings.

    By Samantha Schwartz • Updated Oct. 27, 2020
  • Banking trojan resurfaces targeting JPMorgan, Capital One

    There are "definitely more credentials" floating around the dark web currently because businesses are largely using remote desktop protocol for database access, said Justin Heard, security engineer at Nuspire.

    By Samantha Schwartz • June 17, 2020
  • Sublimits: What execs get wrong about cyber coverage

    Ambiguities and uncertainties can delay adoption or wreak havoc when coverage is needed.

    By Samantha Schwartz • June 16, 2020
  • Manufacturers, service providers primary targets of Q1 ransomware incidents

    In Q2, cybercriminals are ramping up phishing schemes and other tactics that seize on "the opportunities presented by the pandemic."

    By Samantha Schwartz • June 11, 2020
  • Honda resumes most operations after cyberattack

    The malware spread throughout the company's networks, though it said no data was compromised.

    By Samantha Schwartz • June 9, 2020
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Where privacy and security 'clash' for remote work

    Shifting remote meant more personal data than ever before was available online, and cybercriminals were aware.

    By Samantha Schwartz • June 9, 2020
  • Image attribution tooltip
    shironosov via Getty Images
    Image attribution tooltip

    Amid layoffs, companies track down and repossess remote employees' data access, devices

    HR, accounting and IT systems all intersect when workers are laid off. Physical offices made retrieval less complicated — "hand me your badge, hand me your laptop."

    By Samantha Schwartz • June 5, 2020
  • Ransomware operators auction stolen data on dark web

    The pressure of an economic downturn caused by COVID-19 is pressuring companies to avoid paying a ransom, a tactic the hackers are preying on.

    By Samantha Schwartz • June 4, 2020
  • Image attribution tooltip
    Taylor McKnight/CIO Dive
    Image attribution tooltip

    What to know about the proposed CCPA rules

    Lingering ambiguities could create loopholes.

    By Samantha Schwartz • Updated July 1, 2020
  • 1 in 4 e-commerce stores lost company data. Some never got it back

    A lackluster data strategy can mean companies miss out on data's potential to boost profits.

    By June 4, 2020
  • California attorney general submits rules proposal as CCPA enforcement nears

    The final proposals rejected certain leeways for circumventing CCPA compliance for more businesses.

    By Samantha Schwartz • June 3, 2020
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    Hurricanes, global tensions shape Forrester's 9 security priorities for 2020

    Security threats include bad actors exploiting flaws in home networks to climate-change induced wildfires that can put key data centers in harm's way.

    By , June 3, 2020
  • Capitol Hill
    Image attribution tooltip
    The image by Андрей Бобровский is licensed under CC BY 3.0
    Image attribution tooltip

    Commission amends cyber recommendations to reflect COVID-19 vulnerabilities

    Four new recommendations are divided between two sections specific to the pandemic: cybersecurity challenges and lessons in cyber preparedness.

    By Samantha Schwartz • June 2, 2020
  • Capital One ordered to disclose third-party analysis of 2019 breach

    The bank argued the business agreement with cybersecurity firm Mandiant made it a protected legal document.

    By Samantha Schwartz • June 1, 2020
  • Tips for managing enterprise security at home, from patches to reboots

    Troubleshooting takes place at a distance. Adequately managing infrastructure requires simplicity. 

    By Samantha Schwartz • May 29, 2020