Security: Page 28


  • Microsoft nixes 60-day password reset policy

    The password reset policy was a staple for users, though according to Microsoft, an "ancient" one.

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    4 questions to ask before adopting security as a service

    Everyone is "trying to do everything as a service anyway," said Frank Konieczny, U.S. Air Force CTO, but because the services are expected, asking the right questions doesn't always come naturally. 

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Key to success for cyber resilient companies: Frequent communication with leadership

    Support from leaders empowers security professionals to ensure the integrity of their digital economy as more tools are introduced by non-technical employees.

    By Samantha Schwartz • April 25, 2019
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Automation complicates cybersecurity recruiting, survey finds

    The Ponemon findings indicate highly specialized fields like cybersecurity demand more from recruiters because of the relative scarcity of talent.

    By Valerie Bolden-Barrett • April 22, 2019
  • Image attribution tooltip
    Brian Tucker, Industry Dive
    Image attribution tooltip
    Podcast

    EPS Ep. 11: Cybersecurity with Richard Mroz and guest host Naomi Eide

    Utility executives consistently name cybersecurity as the most pressing issue facing their companies. How can they fend off the hacks? Former New Jersey regulator Richard Mroz and CIO Dive Senior Editor Naomi Eide break it down.

    By Gavin Bade • April 16, 2019
  • Phishing 2.0: Employees are desperate and companies more vulnerable

    Refraining from punishing employees is important because attacks are "so sophisticated some of them are bound to get through," said Cath Goulding, head of cybersecurity for Nominet. 

    By April 16, 2019
  • Microsoft warns breached email users of possible phishing schemes

    The content of emails or login credentials were compromised for about 6% of impacted users, reports Motherboard.

    By Samantha Schwartz • April 15, 2019
  • Image attribution tooltip
    Lyft
    Image attribution tooltip

    Reliability at heart of Lyft and Uber's tech, IPOs reveal

    Reliable technology service providers set the foundation for optimal operations, trustworthy security and a five-star customer rating after drop-off.

    By Samantha Schwartz • April 15, 2019
  • Facebook's dark web: A bold hacker's paradise

    The obviousness of bad actors' actions and Facebook's faulty detection process makes the solicitors "either very smart or very stupid," said Ariel Ainhoren, head of threat research at IntSights. 

    By Samantha Schwartz • April 11, 2019
  • 'Typographical' errors add to FBI's weak breach notifications

    The transparency, or lack thereof, for handling breaches has become more of a data privacy issue.

    By Samantha Schwartz • April 10, 2019
  • Image attribution tooltip
    Photo by Headway on Unsplash
    Image attribution tooltip

    94% of CIOs, CISOs have to make protection compromises

    Decision making can move from confident to rattled because of a lack of visibility into endpoints like laptops, servers, virtual machines, containers and cloud infrastructure.

    By Samantha Schwartz • April 4, 2019
  • Image attribution tooltip
    Arizona Beverage Company
    Image attribution tooltip

    Report: Ransomware attack stalls operations at Arizona Beverages

    The beverage company brought in Cisco contractors for incident response after its backup system wouldn't configure as it should, TechCrunch reports. 

    By Samantha Schwartz • April 3, 2019
  • Women make up 24% of cybersecurity workforce — up from 11% in 2017

    The gender gap in cybersecurity adds pressure to the skills gap, but some critics say it is too late to solve the gender issue. 

    By Samantha Schwartz • April 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Remote work brings benefits — but also greater security risks, survey says

    HR and IT professionals must work together to create cybersecurity policies, design employee trainings and communicate their rationale to workers. 

    By Valerie Bolden-Barrett • April 1, 2019
  • Office computers, industrial controls connection 'exacerbated' Hydro's woes

    The industrial company estimates the ransomware attack will cost about $40 million accrued from lost margins and volumes. 

    By Samantha Schwartz • March 28, 2019
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    IT admin has no age claim, despite 'old and antiquated' comment, 3rd Cir. says

    The employer showed that the employee failed to perform routine backups, causing the permanent loss of six weeks' worth of data.

    By Jennifer Carsen • March 27, 2019
  • 61% of CIOs worry about malicious insider threats, survey finds

    Ignorance is security's Achilles' Heel. Insider threats may be scarier when employees don't believe they’re doing anything wrong. 

    By Samantha Schwartz • March 25, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Sorting through the hype: How to get started with DevSecOps

    "DevSecWhat?" The methodology, which integrates security into the full application lifecycle, represents a massive process and cultural shift.

    By Nitzan Miron • March 25, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Weak industrial security one explanation for Hydro's global ransomware attack

    U.S. operations were hit first, but the company's energy operations are running as normal. Primary metal plants are functioning with a "higher degree of manual operations."

    By Samantha Schwartz • March 20, 2019
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    Cybercrime by the numbers: Corporate 'consequences' mount to $13M

    When security fails, the price tag to fix it is hefty and it can signal corporate irresponsibility.

    By Samantha Schwartz • March 18, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    The tug of war between infosec and the C-suite on cloud security

    "When it comes to cloud visibility, CIOs and CISOs can either be the problem or the solution," said FireMon's Tim Woods.

    By Samantha Schwartz • March 14, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Gartner's top 10 security projects for 2019

    Security teams incorrectly assume they can successfully implement projects without first verifying that they have foundational security capabilities and risk assessments in place. 

    By Brian Reed • March 11, 2019
  • Image attribution tooltip
    Photo by Lena Rose on Unsplash
    Image attribution tooltip

    Deloitte partners with comic book initiative to introduce girls to STEM careers, skills

    The partnership will produce four comic books and one graphic novel featuring tech-savvy hero Ella the Engineer.

    By Riia O'Donnell • March 7, 2019
  • Image attribution tooltip
    Kendall Davis for CIO Dive
    Image attribution tooltip
    Deep Dive

    After a breach, CISOs fall on their swords or play the role of scapegoat

    Neither serves a company well, and yet it's no surprise that a C-suite overhaul is common after a massive data debacle.

    By Samantha Schwartz • March 7, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    DevSecOps steps in for companies that don't have time to dedicate to security

    Just over one-quarter of companies have a mature DevOps adoption and those organizations are 350% more likely to integrate automated security, according to a Sonatype report. 

    By Samantha Schwartz • March 5, 2019