Security: Page 22


  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Cognizant's Maze ransomware attack could cost up to $70M

    After the company disclosed the cyberattack last month, customers began to opt out or suspend Cognizant's "access to their networks," which directly impacted billing, said CEO Brian Humphries.

    By Samantha Schwartz • May 12, 2020
  • Contact tracing in public domain
    Image attribution tooltip
    Adeline Kon for CIO Dive/CIO Dive
    Image attribution tooltip

    Privacy vs. public health: Where contact tracing fits

    Contact tracing walks the line between privacy and responsible tech — a line Apple and Google are exploring.

    By Samantha Schwartz • May 7, 2020
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • The Joel Soloman Federal Building and Courthouse in Chattanooga
    Image attribution tooltip
    The image by Original image from Carol M. Highsmith’s America, Library of Congress collection is licensed under CC BY 2.0
    Image attribution tooltip

    Is there room for Zoom in a virtual courtroom?

    Videoconferencing could undermine traditional courtroom tactics, while also alleviating typical trial pains.

    By Samantha Schwartz • May 6, 2020
  • Image attribution tooltip
    The image by hendricks is licensed under CC BY-SA 3.0
    Image attribution tooltip

    Goldman hires CISO away from Morgan Stanley

    In a case of executive shuffle, Matthew Chung is leaving to join Goldman Sachs in a role vacated in May when Andy Ozment moved to Capital One.

    By Dan Ennis • Updated Oct. 2, 2020
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Malicious domains are floating around the cloud: Here's the threat to companies

    More than 56,200 newly-registered domain names were hosted by AWS, Google Cloud, Microsoft Azure and Alibaba, according to research from Palo Alto Networks' Unit 42.

    By Samantha Schwartz • May 4, 2020
  • Hasty Office 365 deployments wrought with security configuration holes

    With work from home orders, companies rushed cloud-based collaboration service deployments. They could undermine any existing Office 365 security strategy, CISA warns.

    By Samantha Schwartz • May 1, 2020
  • Image attribution tooltip
    MSC
    Image attribution tooltip

    3 years, 3 cyberattacks on major ocean carriers. How can shippers protect themselves?

    Shippers and freight forwarders have a role to play in vetting supply chain partners' risks and keeping their data and cargo safe.

    By Shefali Kapadia • April 30, 2020
  • A collage of remote work situations
    Image attribution tooltip
    Danielle Ternes / CIO Dive and ma_rish via Getty Images/CIO Dive
    Image attribution tooltip
    Column

    The Remote Playbook: Logged on at home, employees are an attacker's dream

    The pandemic makes each remote worker a weak link. Ensuring company-wide adherence to policies can protect sensitive company data. 

    By April 30, 2020
  • With Cognizant attack, Maze ransomware finds its way into IT services supply chain

    Maze encrypts and infiltrates files simultaneously, a signature move of the operators. It holds onto valuable data to later publicly publish online. 

    By Samantha Schwartz • April 23, 2020
  • Who is responsible for securing the home network?

    Companies should not expect all of their employees to be IT people; nor should companies overwhelm those suddenly working from home with a long list of security mandates. 

    By April 23, 2020
  • Opinion

    Why CIOs should make DevSecOps a priority during the COVID-19 crisis

    Companies around the world are increasing capacity and taking the opportunity to look again at their DevOps processes and build in security from the ground up.

    By Samuel Bocetta • April 21, 2020
  • Cognizant hit by Maze ransomware attack, client services disrupted

    Maze is an influential piece of ransomware, and other strains copy its modus operandi: encrypt, steal and publish data.

    By Samantha Schwartz • April 20, 2020
  • 'Ancient' Internet Explorer 6 a ripe cyberattack target this year

    Hacking is a time-consuming activity, requiring trial and error. As a shortcut, "relatively unsophisticated hackers" can download exploits at will, said Cloudflare CTO John Graham-Cumming.

    By Samantha Schwartz • April 20, 2020
  • Zero trust isn't a temporary band-aid for remote security

    The coronavirus outbreak and the work-from-home model obliterated a secure perimeter. With business data everywhere, zero trust is what's left.

    By Samantha Schwartz • April 16, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Some hackers are getting lazy

    Palo Alto Networks' Unit 42 found ransomware written by bad actors who failed "to make their lures appear legitimate in any way."

    By Samantha Schwartz • April 14, 2020
  • Image attribution tooltip
    Photo by Josh Appel on Unsplash
    Image attribution tooltip

    Travelex paid the ransom, breach investigation still underway: report

    After discovering the attack, the company took down its websites globally to contain the spread of the virus.

    By Samantha Schwartz • April 9, 2020
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yes, developers break cloud security rules. But do companies have adequate policies in place?

    Even though developers are circumventing compliance policies, companies struggle with adopting guidelines altogether.

    By Samantha Schwartz • April 9, 2020
  • Coronavirus chaos ripe for hackers to exploit medical device vulnerabilities

    As crowded hospital emergency rooms and ICUs in major U.S. cities try to keep up with demand for medical services, their networks face a rising threat level from cybercriminals probing for weaknesses. 

    By Greg Slabodkin • April 9, 2020
  • Zoom
    Image attribution tooltip
    Retrieved from Zoom on April 03, 2020
    Image attribution tooltip

    Zoom's no good, very rotten week: What's next in its security plans

    It might be tempting to believe Zoom's flaws were intentionally hidden, it's more likely popularity brought scrutiny — something all prominent technologies eventually bear. 

    By Samantha Schwartz • April 9, 2020
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    FBI warns of a phishing uptick as hackers latch on to coronavirus

    Bad actors are leveraging business email compromise schemes to target "municipalities purchasing protective equipment" and supplies related to the coronavirus response.

    By Samantha Schwartz • April 8, 2020
  • Zoom's privacy woes lead back to end-to-end encryption

    "We did not design the product with the foresight that, in a matter of weeks, every person in the world would suddenly be working, studying, and socializing from home," wrote CEO Eric Yuan. 

    By Samantha Schwartz • April 2, 2020
  • Image attribution tooltip

    Coder

    Image attribution tooltip
    Sponsored by Coder

    Keeping software development secure and productive in a work from home mandate

    Many organizations have implemented remote work policies to protect their employees. As unexpected business disruptions emerge, Coder provides the solution software engineers need.

    April 2, 2020
  • Image attribution tooltip
    "200323-Z-NI803-0587" by New Jersey National Guard is licensed under CC BY-ND 2.0
    Image attribution tooltip

    Is coronavirus putting privacy on hold?

    The pandemic creates a gray area between helping the greater good and loosening data privacy expectations.

    By Samantha Schwartz • April 1, 2020
  • Marriott International, hotel
    Image attribution tooltip
    Retrieved from Marriott on December 03, 2018
    Image attribution tooltip

    Marriott International's latest data breach hits 5.2M guests

    The hotel chain found the intrusion at the end of February and believes it began mid-January, according to the announcement.

    By Samantha Schwartz • March 31, 2020
  • Coronavirus phishing attacks up 667% since February, research finds

    Spring is typically the time of year bad actors send tax-related phishing emails, but this year they are leveraging human fear and health. 

    By Samantha Schwartz • March 26, 2020