Security: Page 23
-
What 13 RSA Conference attendees want to know
"On the commercial side, the old guard will be under a lot of pressure and challenges from up-and-coming unicorns," said Zvi Guterman, founder and CEO of CloudShare, on the heels of RSA's sale.
By Samantha Schwartz • Feb. 24, 2020 -
MGM Resorts breach opens door for California privacy penalties
The hospitality and entertainment company said it is "confident" no financial information was involved in the incident.
By Samantha Schwartz • Feb. 20, 2020 -
96% of insurers bundle cyber into commercial offerings, report finds
Cyber premiums accounted for less than 1% of the U.S. property and casualty industry in 2018, according to CB Insights.
By Samantha Schwartz • Feb. 19, 2020 -
Dell Technologies sells RSA Security for $2.1B
Dell Technologies is finding its way. In a five-year period, the company went public to private and then back to public.​
By Samantha Schwartz • Feb. 18, 2020 -
How data science tools can lighten the load for cybersecurity teams
Inside security operations centers, data science can help identify attack patterns and increase the chances of detecting threats before it's too late.
By Roberto Torres • Feb. 18, 2020 -
Why 67% of companies fear they can't sustain privacy compliance
True privacy depends on where and how data travels.
By Samantha Schwartz • Feb. 12, 2020 -
4 Chinese military members charged in Equifax hack
The attackers routed traffic through 34 servers in nearly 20 countries to mask their true location, the Justice Department said Monday.
By Dan Ennis , Samantha Schwartz • Feb. 10, 2020 -
Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
Security professional calls for 'kumbaya' approach to information sharing across sectors
If the leader — in this case, DHS — is alone in the ability to identify and sound the alarm about risk, companies have to wait until an employee or an audit finds it.
By Samantha Schwartz • Feb. 10, 2020 -
It took 2 years for federal agencies to meet a 45-day cybersecurity directive
The September 2016 directive was in response to flaws impacting firewalls, Cisco Adaptive Security Appliance and Cisco ROM Monitor Integrity.
By Samantha Schwartz • Feb. 6, 2020 -
Insecure cloud coding templates run rampant, research finds
To maintain a template's "integrity" or prevent outside manipulation, organizations can use role-based access controls and version controls.
By Samantha Schwartz • Feb. 5, 2020 -
An expired Microsoft security certificate took down Teams
To restore service after a certificate expires, companies have to find where the credentials are stored, update all of them and reset applications if necessary.
By Samantha Schwartz • Feb. 4, 2020 -
Organizations only protect 60% of their business ecosystem, Accenture finds
Bad actors find holes in data aggregators, brokers, contractors or other service providers that sit between customers and the companies they do business with.
By Samantha Schwartz • Feb. 3, 2020 -
Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
For zero trust to work, machines and humans require identities
The security method challenges traditional notions of identity management because it includes people, devices and machines.
By Samantha Schwartz • Jan. 30, 2020 -
Cyber insurance policies evolving to meet emerging risks — and premiums reflect it
Insurers are revamping how they underwrite policies, which could make them less forgiving of a client's cybersecurity hygiene.
By Samantha Schwartz • Jan. 28, 2020 -
Misconfigured Microsoft database exposes 250M customers' information
While personally identifiable information was largely redacted, tech support scams could befall impacted customers.
By Samantha Schwartz • Jan. 23, 2020 -
Chipotle, Target CISOs: Repurpose talent for cyber
"I'm as likely to hire somebody with an economics degree as I am with computer science. Economics is about finding patterns in the data," said Dave Estlick, CISO of Chipotle.
By Samantha Schwartz • Jan. 22, 2020 -
Less than 2 years in, GDPR fines hit $126M
Google's $50 million fine for "intentional" data misuse remains the highest penalty to date.
By Samantha Schwartz • Jan. 21, 2020 -
To fend off attacks, CISOs share threat information. Even with competitors
Target's CISO is a member of a Twin Cities-based group of CISOs formed to outline threats companies see.
By Samantha Schwartz • Jan. 21, 2020 -
More cyberattacks tied to geopolitical conflict, businesses caught in the crosshairs
Companies saw an increase in cyberattacks attributed to foreign governments, a Radware study found. The report comes amid news nation-state hackers breached two U.S. municipalities in 2019.
By Samantha Schwartz • Jan. 17, 2020 -
Board members find cybersecurity risk an existential threat
As cyberthreats rise, board members want to be involved in an issue they say requires more than operational decisions enacted by IT management.
By Roberto Torres • Jan. 16, 2020 -
Security is key for retailers. But it can't stand in the way of efficiency, CIO says
When overhauling the furniture retailer's connectivity solutions, Rent-A-Center's Mike Santimaw had to shift the security-focused model of the business.
By Samantha Schwartz • Jan. 14, 2020 -
CIO Dive’s business technology predictions for 2020
In 2020, CIOs will spend their days using data to maximize the efficiency of their workforce, as cyberattacks and fierce competition loom large.
By Samantha Schwartz , Roberto Torres , Naomi Eide • Jan. 13, 2020 -
Is the US private sector prepared for cyber aggression from Iran? Legislators say no
Industry has struggled with open lines of communication during a cyber crisis, and the federal government navigates a tenuous balance with information sharing.
By Samantha Schwartz • Jan. 9, 2020 -
25 business technology trends for 2020
As tech leaders plan for 2020 and beyond, keep a close eye on interoperability and making technology purchasing decisions that can remain flexible in the long-term.
Jan. 9, 2020 -
DHS warns of retaliation from Iran, potential cyberattacks
Iranian threat actors could already be "lying dormant" in U.S. computer networks, according to a former CIA officer.
By Samantha Schwartz • Jan. 7, 2020