Security: Page 24


  • Pickles, mayo and data privacy: Jersey Mike's rethinks mobile authentication

    While historically slow to adopt new technologies, restaurants have to rethink mobile systems in an era of heightened privacy concerns.

    By Samantha Schwartz • Sept. 25, 2019
  • Companies miss 99% of IaaS configuration errors, McAfee says

    In some cases, companies aren't even aware the number of IaaS providers they have.

    By Naomi Eide • Sept. 24, 2019
  • Cybersecurity confidence rattled by continued investments, small results

    Only 11% of firms feel a "high degree of confidence" in their cyber resilience, according to Microsoft's annual cyber survey.

    By Samantha Schwartz • Sept. 20, 2019
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Skepticism slows cloud and SaaS adoption

    CISOs perceive on-premise solutions as the safer option. Relinquishing control to SaaS vendors amplifies a sense of paranoia.

    By Samantha Schwartz • Sept. 17, 2019
  • Target tackles identity and access management with zero trust

    When designing an identity ecosystem, companies need to define access by a "need to know" classification reinforced by zero trust, said Jing Zhang-Lee, principal security architect and engineer at Target.

    By Samantha Schwartz • Sept. 17, 2019
  • 10 lessons Fannie Mae learned redesigning its security network

    The lending company experienced minor hiccups while building out micro-segmentation. 

    By Samantha Schwartz • Sept. 16, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Internet treated casually, but it's 'live-fire combat,' experts say

    Nation state actors attract the attention and get the blame, but cyberattacks are more likely executed by run-of-the-mill cybercriminals.

    By Samantha Schwartz • Sept. 13, 2019
  • First remote cyberattack on US grid found, regulator says

    A March cyberattack resulted in a denial of service condition at a "low-impact" control center and multiple remote generation sites, according to newly released analysis.

    By HJ Mai • Sept. 9, 2019
  • Cybercriminals rake in billions using email compromise, fraudulent tech support

    Total losses from internet cybercrimes reached nearly $3 billion 2018, according to the FBI.

    By Samantha Schwartz • Sept. 9, 2019
  • Banks have more to lose from data breaches than other companies

    Differences in notification urgency highlights data sensitivity. Exposed email addresses are far less sensitive than banking information or social security numbers.

    By Dan Ennis • Sept. 6, 2019
  • Report: Google lobbyists push to add loopholes to California's privacy law

    As lobbyists make last-minute effort to exclude digital advertising from the California Consumer Privacy Act, other states watch closely.

    By Sept. 4, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Faith in cloud security strengthens, but concerns persist

    For a time, CISOs held off cloud adoption because of a lingering belief the cloud was less secure, a Nominet survey found.

    By Samantha Schwartz • Sept. 3, 2019
  • Insurers do the math and instruct cities to pay the ransom, ProPublica reports

    The cyberattack market exists, and while insurers didn't create it, their actions could help sustain it.

    By Samantha Schwartz • Aug. 29, 2019
  • Encryption 101 and the trap of leaving data unprotected

    Encryption protects data from unauthorized eyes if it is ever lost, stolen or breached. Without it, data lays bare and vulnerable.

    By Samantha Schwartz • Aug. 22, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data breaches up 54% YOY, 2019 set to be 'worst year on record'

    Eight breaches exposed more than 3.2 billion records, accounting for nearly 80% of the compromised records so far this year, RiskBased Security research found.

    By Samantha Schwartz • Aug. 21, 2019
  • Texas officials 'unaware' of any ransom payments after widespread attack

    More than half of the 23 organizations impacted are "back to operations as usual" after the August attack, according to the Texas Department of Information Resources. 

    By Samantha Schwartz • Updated Sept. 9, 2019
  • DDoS attacks take 'slow-bleed' approach to curtail detection, research finds

    A sudden service blackout is too noticeable, so hackers deploy smaller, more frequents attacks that are subtle enough to bypass DDoS detection tools. 

    By Samantha Schwartz • Aug. 19, 2019
  • Capital One's hacker breached more than 30 organizations, prosecutors say

    The servers found in Paige Thompson's bedroom held data from the bank and other entities, though the data is not personally identifiable information.

    By Samantha Schwartz • Aug. 15, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Broadcom banks on software-defined future with Symantec buy

    Broadcom will weave Symantec's enterprise business into its expansive portfolio, as it makes the transition from a hardware- to a software-focused provider.

    By Naomi Eide • Aug. 13, 2019
  • One way hackers breach a network: Out-of-date office printers

    Researchers caught a range of vulnerabilities in enterprise printing systems from six top manufacturers.

    By Aug. 13, 2019
  • Federal 'hack back' bill back on table, but critics wary of blind spots

    The latest iteration of the bipartisan bill challenges private entities' response to cyberattacks. Critics argue it lacks guidelines of when or why a company should hack back.

    By Samantha Schwartz • Aug. 12, 2019
  • Broadcom to buy Symantec's enterprise business for $10.7B

    Symantec is coming off a year of leadership changes and a lagging enterprise division as businesses rethink cybersecurity solutions providers. 

    By Naomi Eide , Samantha Schwartz • Aug. 8, 2019
  • Why the type of data doesn't determine privacy penalties

    "The harm to the consumers who had their personal information exposed should be the measuring stick for damages and compensation," said Jerry Ray, COO of SecureAge. 

    By Samantha Schwartz • Aug. 7, 2019
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip

    Azure bug bounty reaches $40K, Microsoft encourages participants to 'do their worst'

    The Azure Security Lab isolates research so individuals can look for vulnerabilities and exploit them.

    By Samantha Schwartz • Aug. 6, 2019
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip

    From Equifax to Capital One: The problem with web application security

    Flaws in web applications are abundant and easy to manipulate, making them a target for bad actors.

    By Samantha Schwartz • Aug. 5, 2019