Security: Page 26


  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    How BMO Financial Group shapes its security strategy

    Two years ago BMO Financial Group instituted a security strategy centered around business value, industry benchmarking, compliance and threat management, said CISO Aman Raheja.

    By Naomi Eide • June 20, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    New breed of security vendor spells trouble for pure play firms

    Cloud service providers are taking security market control from third parties. The key for keeping an edge in the market is having multicloud offerings and on-prem integrations.

    By Naomi Eide • June 19, 2019
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    'Fear, uncertainty and doubt' in the security labor market

    The struggle to hire security professionals is influenced by narrow job descriptions and lack of role standardization.

    By Naomi Eide • June 18, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    A simple message for security teams: Prove the value

    New technologies create new risks. New risks put pressure on the security organization. And the security organization, in a competitive threat and talent landscape, is asked to meet demands while proving worth.

    By Naomi Eide • June 18, 2019
  • Microsoft Office 365 packs strong cyber defense features — if set up correctly

    The suite of cloud-connected enterprise applications holds up well before, during and after an incident, experts said. But only if the right settings are in place. 

    By June 17, 2019
  • Global beer maker hops into cybersecurity

    AB InBev set up an internal cybersecurity unit in Israel to stave off any potential attacks, Reuters reports.

    By June 14, 2019
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip

    Top 10 weaknesses found by bug bounty hunters

    Companies paid $54 million last year to ethical hackers for detecting digital weak spots before the bad guys did. HackerOne ranked the most frequent vulnerabilities.

    By June 12, 2019
  • Beyond the data breach: How retail is addressing cybersecurity

    Experts say companies need to implement data protection strategies including training employees across departments and vetting third-party partners.

    By Tatiana Walk-Morris • June 11, 2019
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Facial recognition tech deemed 'not ready for primetime' in House committee

    Members took issue with the technology on Tuesday, while law enforcement and federal government agencies defended its use.

    By Chris Teale • June 6, 2019
  • Image attribution tooltip
    Kendall Davis / BioPharma Dive
    Image attribution tooltip
    Deep Dive

    Checking for vitals: Inside the Quest Diagnostics, LabCorp supply chain breach

    The intrusion happened inside the American Medical Collection Agency, but responsibility is shared through its partner ecosystem.

    By Samantha Schwartz • June 6, 2019
  • Phishing campaign puts two-factor authentication at risk, but what are the alternatives?

    Even though the phishing campaign can sidestep 2FA, the security protocol is better than using only usernames and passwords.

    By Samantha Schwartz • June 6, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    LabCorp says 7.7M patients exposed in same data breach as Quest Diagnostics

    One of LabCorp's billing collections vendors experienced unauthorized activity on its web payment page between Aug. 1 and March 30.

    By Samantha Schwartz , David Lim • June 5, 2019
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip

    NSA, Microsoft issue BlueKeep vulnerability warnings, call for 'all hands on deck'

    Microsoft is "confident" an exploit exists for BlueKeep, a vulnerability in the Remote Desktop Protocol of older versions of Windows.

    By Samantha Schwartz • June 5, 2019
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    11.9M Quest Diagnostics patients potentially exposed to data breach

    Financial, medical and other personal information, such as Social Security numbers, may have been exposed, the company reported Monday morning.

    By Samantha Schwartz , David Lim • June 3, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    WannaCry exploits healthcare companies with older, unmanaged devices that are difficult to patch

    WannaCry is very much a threat, according to cybersecurity firm Armis. About 40% of healthcare delivery organizations have experienced at least one WannaCry attack in the last six months.

    By Shannon Muchmore • May 31, 2019
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cyberattacks by email impersonators are on the rise

    Seven in 10 companies hit by email impersonation lost data, money or customers, a Mimecast survey shows. Here are three ways to stave off attackers.

    By May 30, 2019
  • Focused on 'governance and controls,' Wells Fargo taps new CISO

    Change marks 2019 for Wells Fargo; in addition to new technology leaders, an external search is underway for a CEO.

    By Naomi Eide • May 29, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    The CIO's view: Critical strategies for winning the security arms race

    Securing the modern business is a relentless pursuit and can sometimes feel impossible as the pace of threats seem to accelerate every day, Signify's CIO writes.

    By Kurt De Ruwe • May 28, 2019
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    Equifax's cybersecurity woes earned it an outlook downgrade from Moody's

    It's the first time cybersecurity weighs on a company's outlook downgrade. Here's why it's unlikely to be the last.

    By May 28, 2019
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    For Graham Holdings, GDPR compliance was a breeze

    The company has a mandatory data inventory every year. It's "an enormous job but it's really critical to us to know what we have," Halota said.

    By Naomi Eide • May 23, 2019
  • Image attribution tooltip
    Photo by Paweł Czerwiński on Unsplash
    Image attribution tooltip

    Google left some G Suite passwords unhashed for almost 15 years

    Chances of Google falling under the regulatory spotlight are dim since no consumers were impacted, but the gaffe could tarnish trust in the company's services.

    By Naomi Eide • May 22, 2019
  • Opinion

    The true impact of GDPR is emerging now

    Businesses need the ability to easily trace data lineage if organizations hope to survive any kind of audit, Snowflake's Kent Graziano writes. 

    By Kent Graziano • May 20, 2019
  • Recorded Future: Ransomware attacks against cities increasing

    Attackers are stumbling into opportunities to hit governments, indicating security weaknesses.

    By Katie Pyzyk • May 16, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    CrowdStrike's chances on the market improve as more companies are hacked, breached

    The current security landscape prepared the stage for the cybersecurity unicorn to make its public debut.

    By Samantha Schwartz • May 15, 2019
  • Opinion

    4 keys to managing an information governance program

    Executive sponsorship and executive leadership are very different, writes Aaron Bryant, chief information governance officer at Washington State Department of Health.

    By Aaron Bryant • May 13, 2019