Security: Page 29


  • Image attribution tooltip
    Getty
    Image attribution tooltip

    CrowdStrike's chances on the market improve as more companies are hacked, breached

    The current security landscape prepared the stage for the cybersecurity unicorn to make its public debut.

    By Samantha Schwartz • May 15, 2019
  • Opinion

    4 keys to managing an information governance program

    Executive sponsorship and executive leadership are very different, writes Aaron Bryant, chief information governance officer at Washington State Department of Health.

    By Aaron Bryant • May 13, 2019
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Microsoft's security recipe: Lock down admin accounts, eliminate passwords altogether

    To prevent over-provisioning, Microsoft established role-based access, tying access rules to the "systems, tools and resources" each role requires.

    By Naomi Eide • May 13, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Charles River sees minimal financial impact from cybersecurity breach

    An incident disclosed last week — discovered quicker-than-usual — likely won't result in significant costs, the company told investors.

    By Kristin Jensen • May 10, 2019
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    FTC requests greater data privacy authority for issuing penalties

    The agency served as the chief federal entity responsible for protecting consumer privacy — and then the internet happened, changing the scope of what the agency regulated.

    By Samantha Schwartz • May 9, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers are causing breaches, but can companies realistically protect themselves?

    Hackers have all the time in the world to figure out a system. Companies, on the other hand, take four years just to replace a server.

    By Samantha Schwartz • May 9, 2019
  • Eddie Bauer faces $9.8M tab for data breach

    The retailer also expects to spend about $5 million, taking steps to ensure that its payment and cybersecurity systems are safe, according to the agreement.

    By Daphne Howland • May 7, 2019
  • Wipro's hackers lived for years before breach

    The breach enabled intruders to launch phishing schemes against "at least a dozen" of the company's customers, reported KrebsonSecurity. 

    By Samantha Schwartz • May 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Open source security improves as companies take on patch deployment

    Bad actors depend on the popularity of open source, making it a prime target. Attackers look for organizations neglecting timely fixes. 

    By Samantha Schwartz • May 1, 2019
  • Microsoft nixes 60-day password reset policy

    The password reset policy was a staple for users, though according to Microsoft, an "ancient" one.

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    4 questions to ask before adopting security as a service

    Everyone is "trying to do everything as a service anyway," said Frank Konieczny, U.S. Air Force CTO, but because the services are expected, asking the right questions doesn't always come naturally. 

    By Samantha Schwartz • April 26, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Key to success for cyber resilient companies: Frequent communication with leadership

    Support from leaders empowers security professionals to ensure the integrity of their digital economy as more tools are introduced by non-technical employees.

    By Samantha Schwartz • April 25, 2019
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Automation complicates cybersecurity recruiting, survey finds

    The Ponemon findings indicate highly specialized fields like cybersecurity demand more from recruiters because of the relative scarcity of talent.

    By Valerie Bolden-Barrett • April 22, 2019
  • Image attribution tooltip
    Brian Tucker/CIO Dive
    Image attribution tooltip
    Podcast

    EPS Ep. 11: Cybersecurity with Richard Mroz and guest host Naomi Eide

    Utility executives consistently name cybersecurity as the most pressing issue facing their companies. How can they fend off the hacks? Former New Jersey regulator Richard Mroz and CIO Dive Senior Editor Naomi Eide break it down.

    By Gavin Bade • April 16, 2019
  • Phishing 2.0: Employees are desperate and companies more vulnerable

    Refraining from punishing employees is important because attacks are "so sophisticated some of them are bound to get through," said Cath Goulding, head of cybersecurity for Nominet. 

    By April 16, 2019
  • Microsoft warns breached email users of possible phishing schemes

    The content of emails or login credentials were compromised for about 6% of impacted users, reports Motherboard.

    By Samantha Schwartz • April 15, 2019
  • Image attribution tooltip
    Retrieved from Lyft on March 29, 2018
    Image attribution tooltip

    Reliability at heart of Lyft and Uber's tech, IPOs reveal

    Reliable technology service providers set the foundation for optimal operations, trustworthy security and a five-star customer rating after drop-off.

    By Samantha Schwartz • April 15, 2019
  • Facebook's dark web: A bold hacker's paradise

    The obviousness of bad actors' actions and Facebook's faulty detection process makes the solicitors "either very smart or very stupid," said Ariel Ainhoren, head of threat research at IntSights. 

    By Samantha Schwartz • April 11, 2019
  • 'Typographical' errors add to FBI's weak breach notifications

    The transparency, or lack thereof, for handling breaches has become more of a data privacy issue.

    By Samantha Schwartz • April 10, 2019
  • Image attribution tooltip
    Photo by Headway on Unsplash
    Image attribution tooltip

    94% of CIOs, CISOs have to make protection compromises

    Decision making can move from confident to rattled because of a lack of visibility into endpoints like laptops, servers, virtual machines, containers and cloud infrastructure.

    By Samantha Schwartz • April 4, 2019
  • Image attribution tooltip
    Arizona Beverage Company
    Image attribution tooltip

    Report: Ransomware attack stalls operations at Arizona Beverages

    The beverage company brought in Cisco contractors for incident response after its backup system wouldn't configure as it should, TechCrunch reports. 

    By Samantha Schwartz • April 3, 2019
  • Women make up 24% of cybersecurity workforce — up from 11% in 2017

    The gender gap in cybersecurity adds pressure to the skills gap, but some critics say it is too late to solve the gender issue. 

    By Samantha Schwartz • April 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Remote work brings benefits — but also greater security risks, survey says

    HR and IT professionals must work together to create cybersecurity policies, design employee trainings and communicate their rationale to workers. 

    By Valerie Bolden-Barrett • April 1, 2019
  • Office computers, industrial controls connection 'exacerbated' Hydro's woes

    The industrial company estimates the ransomware attack will cost about $40 million accrued from lost margins and volumes. 

    By Samantha Schwartz • March 28, 2019
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    IT admin has no age claim, despite 'old and antiquated' comment, 3rd Cir. says

    The employer showed that the employee failed to perform routine backups, causing the permanent loss of six weeks' worth of data.

    By Jennifer Carsen • March 27, 2019