Security: Page 29


  • Facebook's dark web: A bold hacker's paradise

    The obviousness of bad actors' actions and Facebook's faulty detection process makes the solicitors "either very smart or very stupid," said Ariel Ainhoren, head of threat research at IntSights. 

    By Samantha Schwartz • April 11, 2019
  • 'Typographical' errors add to FBI's weak breach notifications

    The transparency, or lack thereof, for handling breaches has become more of a data privacy issue.

    By Samantha Schwartz • April 10, 2019
  • Image attribution tooltip
    Photo by Headway on Unsplash
    Image attribution tooltip

    94% of CIOs, CISOs have to make protection compromises

    Decision making can move from confident to rattled because of a lack of visibility into endpoints like laptops, servers, virtual machines, containers and cloud infrastructure.

    By Samantha Schwartz • April 4, 2019
  • Image attribution tooltip
    Arizona Beverage Company
    Image attribution tooltip

    Report: Ransomware attack stalls operations at Arizona Beverages

    The beverage company brought in Cisco contractors for incident response after its backup system wouldn't configure as it should, TechCrunch reports. 

    By Samantha Schwartz • April 3, 2019
  • Women make up 24% of cybersecurity workforce — up from 11% in 2017

    The gender gap in cybersecurity adds pressure to the skills gap, but some critics say it is too late to solve the gender issue. 

    By Samantha Schwartz • April 3, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Remote work brings benefits — but also greater security risks, survey says

    HR and IT professionals must work together to create cybersecurity policies, design employee trainings and communicate their rationale to workers. 

    By Valerie Bolden-Barrett • April 1, 2019
  • Office computers, industrial controls connection 'exacerbated' Hydro's woes

    The industrial company estimates the ransomware attack will cost about $40 million accrued from lost margins and volumes. 

    By Samantha Schwartz • March 28, 2019
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    IT admin has no age claim, despite 'old and antiquated' comment, 3rd Cir. says

    The employer showed that the employee failed to perform routine backups, causing the permanent loss of six weeks' worth of data.

    By Jennifer Carsen • March 27, 2019
  • 61% of CIOs worry about malicious insider threats, survey finds

    Ignorance is security's Achilles' Heel. Insider threats may be scarier when employees don't believe they’re doing anything wrong. 

    By Samantha Schwartz • March 25, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Sorting through the hype: How to get started with DevSecOps

    "DevSecWhat?" The methodology, which integrates security into the full application lifecycle, represents a massive process and cultural shift.

    By Nitzan Miron • March 25, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Weak industrial security one explanation for Hydro's global ransomware attack

    U.S. operations were hit first, but the company's energy operations are running as normal. Primary metal plants are functioning with a "higher degree of manual operations."

    By Samantha Schwartz • March 20, 2019
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    Cybercrime by the numbers: Corporate 'consequences' mount to $13M

    When security fails, the price tag to fix it is hefty and it can signal corporate irresponsibility.

    By Samantha Schwartz • March 18, 2019
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    The tug of war between infosec and the C-suite on cloud security

    "When it comes to cloud visibility, CIOs and CISOs can either be the problem or the solution," said FireMon's Tim Woods.

    By Samantha Schwartz • March 14, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Gartner's top 10 security projects for 2019

    Security teams incorrectly assume they can successfully implement projects without first verifying that they have foundational security capabilities and risk assessments in place. 

    By Brian Reed • March 11, 2019
  • Image attribution tooltip
    Photo by Lena Rose on Unsplash
    Image attribution tooltip

    Deloitte partners with comic book initiative to introduce girls to STEM careers, skills

    The partnership will produce four comic books and one graphic novel featuring tech-savvy hero Ella the Engineer.

    By Riia O'Donnell • March 7, 2019
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip
    Deep Dive

    After a breach, CISOs fall on their swords or play the role of scapegoat

    Neither serves a company well, and yet it's no surprise that a C-suite overhaul is common after a massive data debacle.

    By Samantha Schwartz • March 7, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    DevSecOps steps in for companies that don't have time to dedicate to security

    Just over one-quarter of companies have a mature DevOps adoption and those organizations are 350% more likely to integrate automated security, according to a Sonatype report. 

    By Samantha Schwartz • March 5, 2019
  • How Verizon Media beefs up cybersecurity with red teams and bounties

    Just because a software update was deployed doesn't mean potential exploits have been eliminated. Challenging assumptions leaves space for healthy skepticism. 

    By Samantha Schwartz • March 1, 2019
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    Is big tech too big? FTC's new technology competition task force may soon have an answer

    Major antitrust action brought against the likes of Facebook, Google or Amazon could serve up the largest technology competition case since Microsoft's troubles in the '90s. 

    By Feb. 27, 2019
  • Image attribution tooltip
    Retrieved from Lyft on October 23, 2017
    Image attribution tooltip

    Lyft's CISO exits as company embraces Silicon Valley trend of embedded security

    Mike Johnson's resignation comes when the rideshare company is exploring distributed security responsibilities.

    By Samantha Schwartz • Feb. 27, 2019
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    Equifax undergoing major tech overhaul as dust settles from breach fallout

    The company is breaking down data siloes and moving customer systems to the public cloud as part of its aggressive 2020 technology plan. 

    By Feb. 26, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    How cybersecurity skill shortage is impacting incident response

    Only one in 10 organizations are able to process 75% or more of their data relating to a security event, according to Oracle and KPMG's survey. 

    By Samantha Schwartz • Feb. 22, 2019
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Why 'living off the land' has become a preferred method of cybercrime

    LotL and supply chain attacks take advantage of trusted applications and partner ecosystems, but prevention requires more sophisticated tools.

    By Samantha Schwartz • Feb. 20, 2019
  • Wendy's $50M cyberattack settlement signals growing threat to quick-service restaurants

    The lawsuit reveals how costly cyberattacks can be for restaurants, which are facing frequent POS and loyalty system hacks.

    By Julie Littman • Feb. 19, 2019
  • No longer a 'big, fat, honking firewall': Cisco focuses on the network amid multicloud complexity

    Companies have a "more complicated environment than they had five years ago when they began this journey to simplification," said CEO Chuck Robbins.

    By Naomi Eide • Feb. 19, 2019