Security: Page 3


  • Dark servers data center room with computers and storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Microsoft, cloud security under the microscope with federal cyber review

    The federal Cyber Safety Review Board will examine issues related to the state-linked hack of Microsoft Exchange and larger concerns tied to identity management and authentication.

    By David Jones • Aug. 14, 2023
  • A group of people standing around a display of video screens
    Image attribution tooltip

    Maxim Hopman/unsplash.com

    Image attribution tooltip
    Sponsored by Elastic

    How to create seamless customer journeys with generative AI

    Explore the transformative power of generative artificial intelligence (GAI) in enhancing customer experiences, leveraging big data and fostering brand loyalty.

    By Rick Laner, Chief Customer Officer, Elastic • Aug. 14, 2023
  • Cybersecurity priorities 2020 Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive
    Image attribution tooltip
    Trendline

    Cybersecurity

    Security strategies benefit from nimbleness as companies respond to Log4j and other high-profile vulnerabilities, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Matt Kapko • Aug. 10, 2023
  • U.S. President Joe Biden waves toward visitors watching the departure as he walks to Marine One on the South Lawn of the White House July 28, 2023 in Washington, DC.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House launches AI cyber competition to fix software vulnerabilities

    In partnership with OpenAI, Anthropic, Google and Microsoft, participants will have access to top AI companies’ technology for designing new cybersecurity solutions.

    By Aug. 9, 2023
  • A sign is posted on the exterior of Zoom headquarters on February 07, 2023 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Zoom emphasizes customer consent as critics question AI service terms

    Concerns stem from what Zoom says it will do with customer and service-generated data and what its policy language allows. 

    By Updated Aug. 11, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS pledges $20M to K-12 cyber training, incident response

    The cloud services provider is participating in a broad White House plan to build additional protection to defend schools against ransomware and other threats.

    By David Jones • Aug. 8, 2023
  • SEC reporting
    Image attribution tooltip
    Kobus Louw via Getty Images
    Image attribution tooltip

    Businesses improved cyber incident response times following Log4j, report finds

    Security teams have improved their response times during attacks, but post-incident recovery still lagged, according to Immersive Labs.

    By David Jones • Aug. 4, 2023
  • An executive signs paperwork inside a meeting room, two workers sitting at either side
    Image attribution tooltip
    NoSystem Images via Getty Images
    Image attribution tooltip

    C-suite, rank-and-file at odds over security’s role

    Half of executives say security is prioritized when implementing a cloud strategy. Most security workers beg to differ.

    By Aug. 3, 2023
  • Bank sign on glass wall of business center
    Image attribution tooltip
    ultramarine5 via Getty Images
    Image attribution tooltip

    FINOS moves to rationalize financial industry cloud controls

    Citi, Goldman Sachs and Morgan Stanley are among the companies participating in the Fintech Open Source Foundation project, which will introduce a framework this year.

    By July 28, 2023
  • Close up photo of a man in a suit.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    SEC votes to overhaul disclosure rules for material cyber events

    After a fierce debate, the agency voted to require companies to come clean on material breaches and attacks within four business days of determination.

    By David Jones • July 26, 2023
  • Businessman does Financial Analysis talks to Group of Businessspeople. Projector Screen Shows Stock Market Data, Investment Strategy, Revenue Growth.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cybercriminals target highly profitable companies, study finds

    Damage from cybercrime far exceeds the sum of costs to targeted companies, harming peer companies and the broader economy, researchers at AEI found. 

    By Jim Tyson • July 7, 2023
  • A robot's hands are seen typing on a computer keyboard.
    Image attribution tooltip
    XH4D via Getty Images
    Image attribution tooltip

    The role for AI in cybersecurity

    Generative AI can become an ally for new security professionals who may otherwise feel overwhelmed. For more seasoned security analysts, it can offer time to refine their skills through automation of repetitive tasks.

    By Sue Poremba • July 5, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    AI linked to new crop of business email scams

    Fraudsters appear to be using AI to craft well-written, malicious email messages at scale.

    By Alexei Alexis • June 28, 2023
  • Google and the Consortium of Cybersecurity Clinics are collaborating on an effort to train diverse students in cybersecurity.
    Image attribution tooltip
    Courtesy of Consortium of Cybersecurity Clinics
    Image attribution tooltip

    Google backs $20M effort to train students for key cybersecurity jobs

    The program will train diverse students at 20 higher education centers in the U.S. Students will then provide services at under-resourced infrastructure providers.

    By David Jones • June 27, 2023
  • Digital background depicting innovative technologies in security systems, data protection Internet technologies 3d rendering
    Image attribution tooltip
    Olemedia via Getty Images
    Image attribution tooltip
    Sponsored by Miro

    6 strategies for optimizing the security of your SaaS stack

    Learn more about different solutions for how your organizations can enhance the security of your ever-growing SaaS stacks.

    By Robbie Strickland, Chief Information Officer at Miro • June 26, 2023
  • An illustration of people using computers with dialogue bubbles and a robot on a screen.
    Image attribution tooltip
    girafchik123 via Getty Images
    Image attribution tooltip

    Cyber CEOs are all-in on generative AI

    Generative AI and LLMs are gaining attention in the security industry, but not everyone is convinced the technologies will deliver the benefits promised.

    By Matt Kapko • June 23, 2023
  • Fintech electronic banking mobile network technology
    Image attribution tooltip
    alexsl via Getty Images
    Image attribution tooltip
    Sponsored by Elastic

    Banks are leveraging modern cloud security tools to mitigate human error

    The financial sector’s cloud workloads more than doubled from 2021 to 2022. What does this mean for the industry?

    By Brandon Mavleos • June 20, 2023
  • Kemba Walden, acting national cyber director, speaks with David Levy, VP, government, nonprofit and healthcare at AWS, during a fireside chat at the AWS Summit with David
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    Hyperscalers seen as key tool in shifting balance of cyber risk

    The acting national cyber director says more oversight may be necessary, but a resilient cloud infrastructure is critical to the national cybersecurity strategy.

    By David Jones • June 12, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    Cybercriminals target C-suite, family members with sophisticated attacks

    Senior executives are being targeted for IP theft, doxxing and extortion, often through home office networks.

    By David Jones • June 7, 2023
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs still expect cyber budget increases amid economic pressure

    Security executives continue to focus on maximizing value as they seek a more efficient and simplified security posture, according to a report from Nuspire.

    By David Jones • June 1, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip

    Palo Alto Networks teases plans for generative AI across security services

    The security vendor is taking a restrained approach to deploying generative AI products, but the company’s leaders still believe the technology will herald a major shift for cybersecurity.

    By Matt Kapko • May 31, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber resilience programs fall short on preparing workers for a crisis

    The report from Immersive Labs raises questions about whether corporate employees would know how to respond after a major cyberattack.

    By David Jones • May 30, 2023
  • Cybercriminal experts assemble in conference room.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Why and how to report a ransomware attack

    The majority of ransomware attacks go unreported, creating a blind spot that hampers response, recovery efforts and the prevention of future attacks.

    By Matt Kapko • May 19, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By May 18, 2023
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    SolarWinds turns to Infosys to accelerate SaaS shift

    The move eases the transition from on-prem to cloud-based software that was already underway, President and CEO Sudhakar Ramakrishna said.

    By May 11, 2023