Security: Page 24


  • A company is suing its hackers — it doesn't know who they are

    In a search for redress, cable manufacturer Southwire filed a civil suit against "John Doe," the yet-to-be identified operators behind a ransomware attack. 

    By Samantha Schwartz • Jan. 7, 2020
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    Forrester: To stay secure, employers must balance insider threat protection and employee rights

    Ethical challenges may require HR's involvement, but research found most HR professionals aren't serious enough about the topic. 

    By Valerie Bolden-Barrett , Samantha Schwartz • Jan. 6, 2020
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    5 cybersecurity trends for 2020

    With industry-known strains morphing into new killers and regulators dutifully watching for errors, companies are leaning on their infosec teams more than ever.

    By Samantha Schwartz • Jan. 6, 2020
  • CIO Dive's Top News of 2019

    The world of business technology is nonstop and the Top News of 2019 honors the constant churn.

    Dec. 27, 2019
  • 62% of breached data came from financial services in 2019

    In financial services, an average breach costs $210 per record, while a "mega breach," like Capital One's, can cost up to $388 per record.

    By Samantha Schwartz • Dec. 23, 2019
  • Macy's data breach caused by a customized Magecart attack, research finds

    Digital skimmers have been around for years, but a new type of point-of-sale attack is tailored for the target. 

    By Samantha Schwartz • Dec. 20, 2019
  • Image attribution tooltip
    Photo by Josh Appel on Unsplash
    Image attribution tooltip

    Kaspersky: IT security budgets fell in 2019

    IT security budgets dropped by an average of $77,628 from 2018 to 2019.

    By Samantha Schwartz • Dec. 19, 2019
  • Image attribution tooltip
    Unsplash
    Image attribution tooltip

    G Suite to cut off access to 'non-Google' apps by 2021 to protect account data

    Third-party less secure apps include applications with access to a G Suite account's calendar, contacts, and email "via protocols such as CalDAV, CardDav and IMAP."

    By Samantha Schwartz • Dec. 17, 2019
  • New Orleans declares state of emergency after cyberattack

    The city is in "recovery mode," and while services have been disrupted, there was minimal data loss, Mayor LaToya Cantrell said at a press conference.

    By Chris Teale , Samantha Schwartz • Dec. 16, 2019
  • REvil: The next prolific strain of ransomware to watch

    GandCrab's successor is hitting dentists particularly hard.

    By Samantha Schwartz • Dec. 13, 2019
  • Dive Awards

    CISO of the Year: Andy Powell, Maersk

    Powell rapidly grew Maersk's cybersecurity organization, reestablishing resilience for a legacy company.

    By Samantha Schwartz • Dec. 9, 2019
  • CyrusOne hit by REvil ransomware, impacting 6 managed service customers

    REvil is connected to the ransomware attacks on more than 23 Texas municipalities and 400 U.S. dentist offices.

    By Samantha Schwartz • Dec. 5, 2019
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    HackerOne's breach highlights security business partner risk

    No malicious intent or activity was found and copies of the data were deleted after a HackerOne community member disclosed a vulnerability. 

    By Samantha Schwartz • Dec. 5, 2019
  • 58% of companies fail to meet GDPR's data request deadlines

    By comparison, 70% of companies last year didn't meet requests on time, according to Talend.

    By Samantha Schwartz • Dec. 4, 2019
  • Enterprise neglect leaves Black Friday cybersecurity responsibility to customers

    Cybercriminals feed on shoppers with weak personal cyber hygiene. Have companies done enough to protect customers?

    By Samantha Schwartz • Nov. 27, 2019
  • Q&A

    Maersk CISO on NotPetya recovery, workforce harmony and what makes a security chief

    The shipping giant tapped Andy Powell a year after it was hit by NotPetya. In the 18 months since, Powell increased its security organization from 28 people to about 150. 

    By Samantha Schwartz • Nov. 22, 2019
  • Microsoft heightens privacy obligations with updates to cloud contracts

    The changes under GDPR will roll out globally to Microsoft customers, in keeping with a company trend of expanding privacy regulations beyond their scope.

    By Nov. 18, 2019
  • Deep Dive

    'Golden bullet' clauses protect CISOs after a breach

    A financial cushion will not shield an executive from public scrutiny, but it can alleviate the burden of blame.

    By Samantha Schwartz • Nov. 18, 2019
  • Capital One removes CISO from role following breach

    Michael Johnson will remain at Capital One as an advisor, focused on the bank's ongoing response to the data breach. The bank is conducting an external search for a new CISO. 

    By Samantha Schwartz • Nov. 7, 2019
  • 0% unemployment rate and 5 other numbers you need to know about cybersecurity

    For professionals considering a job in cybersecurity, the outlook is promising.

    By Samantha Schwartz • Nov. 7, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Q&A

    5 questions with Cisco's CISO

    Steve Martino is tasked with leading Cisco's security strategy, navigating risk in an environment where threats are ever-present and human error is assured. 

    By Naomi Eide • Nov. 7, 2019
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    Don't do the obvious after a ransomware attack, do remain paranoid

    Nearly one-third of adults chose to restart their computers in response to a ransomware attack, according to a Stanford survey, a potentially devastating mistake.  

    By Samantha Schwartz • Nov. 6, 2019
  • Image attribution tooltip
    Courtesy of Gartner
    Image attribution tooltip

    Gartner's strategic tech trends for 2020: Part 2, computing moves to the edge

    AI-based systems are becoming smarter, giving rise to autonomy. Hardware is shrinking, pushing computing to the edge. And the ever-hyped blockchain is finding "practical" applications.

    By Naomi Eide • Nov. 5, 2019
  • Opinion

    How to keep IT security team ahead of alert fatigue

    With e-commerce and cybercrime growing exponentially, alert fatigue has seeped into the digital realm. It's the electronic equivalent of the boy who cried wolf, and it's taking a toll.

    By Samuel Bocetta • Nov. 4, 2019
  • Image attribution tooltip
    Unsplash
    Image attribution tooltip
    Opinion

    Cybersecurity tricks and treats to protect your business

    For CISOs and security professionals, it’s always spooky season. There is nothing make-believe about their arch-enemies —​ cybercriminals — who lurk tirelessly in the shadowy background.

    By Edgardo Artusi • Oct. 31, 2019