Security: Page 27


  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Facial recognition tech deemed 'not ready for primetime' in House committee

    Members took issue with the technology on Tuesday, while law enforcement and federal government agencies defended its use.

    By Chris Teale • June 6, 2019
  • Image attribution tooltip
    Kendall Davis / BioPharma Dive
    Image attribution tooltip
    Deep Dive

    Checking for vitals: Inside the Quest Diagnostics, LabCorp supply chain breach

    The intrusion happened inside the American Medical Collection Agency, but responsibility is shared through its partner ecosystem.

    By Samantha Schwartz • June 6, 2019
  • Phishing campaign puts two-factor authentication at risk, but what are the alternatives?

    Even though the phishing campaign can sidestep 2FA, the security protocol is better than using only usernames and passwords.

    By Samantha Schwartz • June 6, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    LabCorp says 7.7M patients exposed in same data breach as Quest Diagnostics

    One of LabCorp's billing collections vendors experienced unauthorized activity on its web payment page between Aug. 1 and March 30.

    By Samantha Schwartz , David Lim • June 5, 2019
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip

    NSA, Microsoft issue BlueKeep vulnerability warnings, call for 'all hands on deck'

    Microsoft is "confident" an exploit exists for BlueKeep, a vulnerability in the Remote Desktop Protocol of older versions of Windows.

    By Samantha Schwartz • June 5, 2019
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    11.9M Quest Diagnostics patients potentially exposed to data breach

    Financial, medical and other personal information, such as Social Security numbers, may have been exposed, the company reported Monday morning.

    By Samantha Schwartz , David Lim • June 3, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    WannaCry exploits healthcare companies with older, unmanaged devices that are difficult to patch

    WannaCry is very much a threat, according to cybersecurity firm Armis. About 40% of healthcare delivery organizations have experienced at least one WannaCry attack in the last six months.

    By Shannon Muchmore • May 31, 2019
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cyberattacks by email impersonators are on the rise

    Seven in 10 companies hit by email impersonation lost data, money or customers, a Mimecast survey shows. Here are three ways to stave off attackers.

    By May 30, 2019
  • Focused on 'governance and controls,' Wells Fargo taps new CISO

    Change marks 2019 for Wells Fargo; in addition to new technology leaders, an external search is underway for a CEO.

    By Naomi Eide • May 29, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    The CIO's view: Critical strategies for winning the security arms race

    Securing the modern business is a relentless pursuit and can sometimes feel impossible as the pace of threats seem to accelerate every day, Signify's CIO writes.

    By Kurt De Ruwe • May 28, 2019
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    Equifax's cybersecurity woes earned it an outlook downgrade from Moody's

    It's the first time cybersecurity weighs on a company's outlook downgrade. Here's why it's unlikely to be the last.

    By May 28, 2019
  • Image attribution tooltip
    Naomi Eide for CIO Dive
    Image attribution tooltip

    For Graham Holdings, GDPR compliance was a breeze

    The company has a mandatory data inventory every year. It's "an enormous job but it's really critical to us to know what we have," Halota said.

    By Naomi Eide • May 23, 2019
  • Image attribution tooltip
    Photo by Paweł Czerwiński on Unsplash
    Image attribution tooltip

    Google left some G Suite passwords unhashed for almost 15 years

    Chances of Google falling under the regulatory spotlight are dim since no consumers were impacted, but the gaffe could tarnish trust in the company's services.

    By Naomi Eide • May 22, 2019
  • Opinion

    The true impact of GDPR is emerging now

    Businesses need the ability to easily trace data lineage if organizations hope to survive any kind of audit, Snowflake's Kent Graziano writes. 

    By Kent Graziano • May 20, 2019
  • Recorded Future: Ransomware attacks against cities increasing

    Attackers are stumbling into opportunities to hit governments, indicating security weaknesses.

    By Katie Pyzyk • May 16, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    CrowdStrike's chances on the market improve as more companies are hacked, breached

    The current security landscape prepared the stage for the cybersecurity unicorn to make its public debut.

    By Samantha Schwartz • May 15, 2019
  • Opinion

    4 keys to managing an information governance program

    Executive sponsorship and executive leadership are very different, writes Aaron Bryant, chief information governance officer at Washington State Department of Health.

    By Aaron Bryant • May 13, 2019
  • Microsoft's security recipe: Lock down admin accounts, eliminate passwords altogether

    To prevent over-provisioning, Microsoft established role-based access, tying access rules to the "systems, tools and resources" each role requires.

    By Naomi Eide • May 13, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Charles River sees minimal financial impact from cybersecurity breach

    An incident disclosed last week — discovered quicker-than-usual — likely won't result in significant costs, the company told investors.

    By Kristin Jensen • May 10, 2019
  • Image attribution tooltip
    Getty / edited by Industry Dive
    Image attribution tooltip

    FTC requests greater data privacy authority for issuing penalties

    The agency served as the chief federal entity responsible for protecting consumer privacy — and then the internet happened, changing the scope of what the agency regulated.

    By Samantha Schwartz • May 9, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers are causing breaches, but can companies realistically protect themselves?

    Hackers have all the time in the world to figure out a system. Companies, on the other hand, take four years just to replace a server.

    By Samantha Schwartz • May 9, 2019
  • Eddie Bauer faces $9.8M tab for data breach

    The retailer also expects to spend about $5 million, taking steps to ensure that its payment and cybersecurity systems are safe, according to the agreement.

    By Daphne Howland • May 7, 2019
  • Wipro's hackers lived for years before breach

    The breach enabled intruders to launch phishing schemes against "at least a dozen" of the company's customers, reported KrebsonSecurity. 

    By Samantha Schwartz • May 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Open source security improves as companies take on patch deployment

    Bad actors depend on the popularity of open source, making it a prime target. Attackers look for organizations neglecting timely fixes. 

    By Samantha Schwartz • May 1, 2019
  • Microsoft nixes 60-day password reset policy

    The password reset policy was a staple for users, though according to Microsoft, an "ancient" one.

    By Samantha Schwartz • April 26, 2019