Security: Page 28


  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cyberattacks by email impersonators are on the rise

    Seven in 10 companies hit by email impersonation lost data, money or customers, a Mimecast survey shows. Here are three ways to stave off attackers.

    By May 30, 2019
  • Focused on 'governance and controls,' Wells Fargo taps new CISO

    Change marks 2019 for Wells Fargo; in addition to new technology leaders, an external search is underway for a CEO.

    By Naomi Eide • May 29, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    The CIO's view: Critical strategies for winning the security arms race

    Securing the modern business is a relentless pursuit and can sometimes feel impossible as the pace of threats seem to accelerate every day, Signify's CIO writes.

    By Kurt De Ruwe • May 28, 2019
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    Equifax's cybersecurity woes earned it an outlook downgrade from Moody's

    It's the first time cybersecurity weighs on a company's outlook downgrade. Here's why it's unlikely to be the last.

    By May 28, 2019
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip

    For Graham Holdings, GDPR compliance was a breeze

    The company has a mandatory data inventory every year. It's "an enormous job but it's really critical to us to know what we have," Halota said.

    By Naomi Eide • May 23, 2019
  • Image attribution tooltip
    Photo by Paweł Czerwiński on Unsplash
    Image attribution tooltip

    Google left some G Suite passwords unhashed for almost 15 years

    Chances of Google falling under the regulatory spotlight are dim since no consumers were impacted, but the gaffe could tarnish trust in the company's services.

    By Naomi Eide • May 22, 2019
  • Opinion

    The true impact of GDPR is emerging now

    Businesses need the ability to easily trace data lineage if organizations hope to survive any kind of audit, Snowflake's Kent Graziano writes. 

    By Kent Graziano • May 20, 2019
  • Recorded Future: Ransomware attacks against cities increasing

    Attackers are stumbling into opportunities to hit governments, indicating security weaknesses.

    By Katie Pyzyk • May 16, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    CrowdStrike's chances on the market improve as more companies are hacked, breached

    The current security landscape prepared the stage for the cybersecurity unicorn to make its public debut.

    By Samantha Schwartz • May 15, 2019
  • Opinion

    4 keys to managing an information governance program

    Executive sponsorship and executive leadership are very different, writes Aaron Bryant, chief information governance officer at Washington State Department of Health.

    By Aaron Bryant • May 13, 2019
  • Microsoft's security recipe: Lock down admin accounts, eliminate passwords altogether

    To prevent over-provisioning, Microsoft established role-based access, tying access rules to the "systems, tools and resources" each role requires.

    By Naomi Eide • May 13, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Charles River sees minimal financial impact from cybersecurity breach

    An incident disclosed last week — discovered quicker-than-usual — likely won't result in significant costs, the company told investors.

    By Kristin Jensen • May 10, 2019
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    FTC requests greater data privacy authority for issuing penalties

    The agency served as the chief federal entity responsible for protecting consumer privacy — and then the internet happened, changing the scope of what the agency regulated.

    By Samantha Schwartz • May 9, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers are causing breaches, but can companies realistically protect themselves?

    Hackers have all the time in the world to figure out a system. Companies, on the other hand, take four years just to replace a server.

    By Samantha Schwartz • May 9, 2019
  • Eddie Bauer faces $9.8M tab for data breach

    The retailer also expects to spend about $5 million, taking steps to ensure that its payment and cybersecurity systems are safe, according to the agreement.

    By Daphne Howland • May 7, 2019
  • Wipro's hackers lived for years before breach

    The breach enabled intruders to launch phishing schemes against "at least a dozen" of the company's customers, reported KrebsonSecurity. 

    By Samantha Schwartz • May 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Open source security improves as companies take on patch deployment

    Bad actors depend on the popularity of open source, making it a prime target. Attackers look for organizations neglecting timely fixes. 

    By Samantha Schwartz • May 1, 2019
  • Microsoft nixes 60-day password reset policy

    The password reset policy was a staple for users, though according to Microsoft, an "ancient" one.

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    4 questions to ask before adopting security as a service

    Everyone is "trying to do everything as a service anyway," said Frank Konieczny, U.S. Air Force CTO, but because the services are expected, asking the right questions doesn't always come naturally. 

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Key to success for cyber resilient companies: Frequent communication with leadership

    Support from leaders empowers security professionals to ensure the integrity of their digital economy as more tools are introduced by non-technical employees.

    By Samantha Schwartz • April 25, 2019
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Automation complicates cybersecurity recruiting, survey finds

    The Ponemon findings indicate highly specialized fields like cybersecurity demand more from recruiters because of the relative scarcity of talent.

    By Valerie Bolden-Barrett • April 22, 2019
  • Image attribution tooltip
    Brian Tucker/CIO Dive
    Image attribution tooltip
    Podcast

    EPS Ep. 11: Cybersecurity with Richard Mroz and guest host Naomi Eide

    Utility executives consistently name cybersecurity as the most pressing issue facing their companies. How can they fend off the hacks? Former New Jersey regulator Richard Mroz and CIO Dive Senior Editor Naomi Eide break it down.

    By Gavin Bade • April 16, 2019
  • Phishing 2.0: Employees are desperate and companies more vulnerable

    Refraining from punishing employees is important because attacks are "so sophisticated some of them are bound to get through," said Cath Goulding, head of cybersecurity for Nominet. 

    By April 16, 2019
  • Microsoft warns breached email users of possible phishing schemes

    The content of emails or login credentials were compromised for about 6% of impacted users, reports Motherboard.

    By Samantha Schwartz • April 15, 2019
  • Image attribution tooltip
    Retrieved from Lyft on March 29, 2018
    Image attribution tooltip

    Reliability at heart of Lyft and Uber's tech, IPOs reveal

    Reliable technology service providers set the foundation for optimal operations, trustworthy security and a five-star customer rating after drop-off.

    By Samantha Schwartz • April 15, 2019