Security: Page 3

  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google stresses unmet need for software supply chain security

    The open source software ecosystem remains vulnerable, and fragmented efforts could stifle progress, according to Google.

    By Matt Kapko • Dec. 9, 2022
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Internet Explorer is still a viable attack vector

    North Korea-linked threat actors are using a technique that has been widely used to exploit the browser since 2017, Google researchers found.

    By Matt Kapko • Dec. 8, 2022
  • AWS CEO Adam Selipsky
    Image attribution tooltip
    Noah Berger/Getty Images via Getty Images
    Image attribution tooltip

    AWS CEO stresses the core elements of cloud security

    Adam Selipsky described security as a prerequisite for organizations to trust cloud infrastructure. And for that, he claimed, AWS is the best in the game.

    By Matt Kapko • Dec. 1, 2022
  • A digital lock on a computer memory board with red and blue lights intersecting
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Why cyberattackers love IT professionals — and how organizations can keep risk at bay

    Limiting admin access is one step toward strengthening defenses, but there are other ways to reduce vulnerabilities.

    By Brian Eastwood • Nov. 30, 2022
  • Manager typing on computer
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Tech surveillance can stave off insider threats, but employers need guardrails

    When security surveillance becomes intrusive, electronic surveillance and automated management strategies can evolve into a liability.

    By Nov. 29, 2022
  • Pedestrians walk beside a stone wall with gilded letters spelling out "14 Wall Street."
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    As CIOs tighten tech spend, demand for cybersecurity services grows

    Managed service providers can help fill talent needs and tame costs, but that strategy may require additional risk mitigation.

    By Suman Bhattacharyya • Nov. 28, 2022
  • A person on a video call/filming/taking photos of a family toasting for a holiday dinner at home.
    Image attribution tooltip
    FG Trade via Getty Images
    Image attribution tooltip

    Cybercriminals strike understaffed organizations on weekends and holidays

    Organizations are short-staffed on holidays and weekends, even though that's when attackers are likely to strike, Cybereason research found.

    By Matt Kapko • Nov. 21, 2022
  • McDonald's Q1 Earnings Up On Higher Menu Prices, Overseas Growth
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    McDonald’s to launch cybersecurity apprenticeship program

    The restaurant chain's initiative is among nearly 200 registered apprenticeships programs approved or under development as part of the White House's Cybersecurity Apprenticeship Sprint.

    By Nov. 16, 2022
  • Funny glasses depicted against a gray wall
    Image attribution tooltip
    iStock / Getty Images via Getty Images
    Image attribution tooltip

    No, your CEO is not texting you

    Everyone wants to stay on good terms with their employer. Threat actors know this too and exploit this weakness accordingly. Don’t fall for it.

    By Matt Kapko • Nov. 11, 2022
  • Red emergency button with words "Recover Data" printed on it.
    Image attribution tooltip
    matdesign24 via Getty Images
    Image attribution tooltip

    Cloud or on-prem? Companies flip-flop on workload decisions

    Shifting data back and forth between cloud and on-prem, a common practice, complicates cybersecurity efforts.

    By Nov. 10, 2022
  • Businessman calculating finances with pen in one hand and calculator in the other.
    Image attribution tooltip
    aphrodite74 via Getty Images
    Image attribution tooltip

    Break-fix, cloud integration and security open enterprise doors for MSPs

    Managed service providers are using one-off projects to initiate long-term relationships with companies beset by talent shortages and budgeting constraints.

    By Nov. 7, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Face it, password policies and managers are not protecting users

    Passwords haven’t worked as a solid security strategy in a long time. The policies are there, so why are passwords security’s weak spot?

    By Sue Poremba • Nov. 7, 2022
  • Engineer's toolbox
    Image attribution tooltip
    Matt Cardy/Getty Images via Getty Images
    Image attribution tooltip

    ‘Point solutions just need to die’: The end of the one-trick security tool

    The deconstruction of security products makes companies grapple with avoidable IT challenges.

    By Matt Kapko • Oct. 31, 2022
  • Female teleworker texting using laptop and internet, working online. Freelancer typing at home office, workplace.
    Image attribution tooltip

    Image attribution tooltip
    Sponsored by Imprivata

    Resource constraints, recession woes and risks: What’s driving vendor consolidation

    After surging attacks remodeled the security landscape, organizations are realizing the downfalls of having multiple vendors.

    By Wes Wright, Chief Technology Officer, Imprivata • Oct. 31, 2022
  • A Microsoft logo is seen during the 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Microsoft security business surges as cloud segment hit by slumping economy

    Higher energy costs and the macro economic slowdown are impacting the company’s cloud segment, but it continues to grow its enterprise security business.

    By David Jones • Oct. 26, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Cybersecurity spending on pace to surpass $260B by 2026

    Gartner pinned annual double-digit growth on three transitionary megatrends: remote work, zero trust network access, and the cloud.

    By Matt Kapko • Oct. 21, 2022
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    4 ways Target tracks cyberthreats to defend its systems

    Not all threats are treated equally, the retailer’s threat analysts said. 

    By Matt Kapko • Oct. 20, 2022
  • Brian Gattoni speaking on stage.
    Image attribution tooltip
    Roberto Torres/CIO Dive
    Image attribution tooltip

    Cyber defense is not IT’s job alone, CISA CTO says

    While tech executives must provide critical tools and procedures to lower cyber risk, the whole organization is responsible for fending off attackers.

    By Oct. 18, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    4 tips to protect IT employees from phishing attacks

    No one is perfect, and that includes your IT professionals. Here's what security experts say could help mitigate human error.

    By Oct. 14, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Mandiant propels Google Cloud’s security prospects

    With Mandiant officially under his wing, Google Cloud CISO Phil Venables expects the incident responders to help Google become a proactive force.

    By Matt Kapko • Oct. 12, 2022
  • Students sit at computer terminals in a classroom.
    Image attribution tooltip
    sturti via Getty Images
    Image attribution tooltip

    Struggling to find cyber pros? Look to your network admins

    Network knowledge and skills are central to cyber. Certification programs provide a direct route from systems to security.

    By Oct. 10, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Multifactor authentication is not all it’s cracked up to be

    MFA is only as strong as the weakest link in the supply chain — and the resilience of each individual using it.

    By Matt Kapko • Oct. 6, 2022
  • Tenable logo on a wall
    Image attribution tooltip
    Permission granted by Tenable
    Image attribution tooltip

    Tenable’s CIO pushes resource optimization as company pursues $1B in revenue

    Technology veteran Patricia Grant is joining the cybersecurity company amid sustained industry growth. Her challenge now is to help Tenable scale.

    By Oct. 5, 2022
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    C-suite, boards are prioritizing cybersecurity, but still expect increased threats

    Senior executives are taking risk management more seriously, PwC found. But many are still concerned about business resilience.

    By David Jones • Oct. 4, 2022
  • Padlock on credit cards and us dollars.
    Image attribution tooltip
    baona via Getty Images
    Image attribution tooltip

    Security to take an outsized role in IT spending in 2023

    Modernization has taught companies that cyber spend is a smart investment.

    By Oct. 4, 2022