Security: Page 31


  • IT professionals looking for work can name their price

    Companies of all sizes plan to increase their cybersecurity talent, but smaller organizations also want more skills for DevOps, hardware and infrastructure. 

    By Samantha Schwartz • Nov. 7, 2018
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    What digital change means for cybersecurity: Rip up the playbook and take risks

    Playbooks are good learning tools, but if attackers aren't following the rules, why should anyone else?

    By Samantha Schwartz • Nov. 1, 2018
  • CIOs and CISOs no longer solely own cybersecurity responsibility

    "Very few people own consequence right now," said William Evanina, director at the Office of the National Intelligence, but "we should all own consequence."

    By Samantha Schwartz • Oct. 31, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    How the nastiest ransomware and flaws get their names

    Which one of these was not the name of an attack/flaw: Heartbleed, Masacre3, Venom, Petya, Frogwarts? Read to find out. 

    By Samantha Schwartz • Oct. 31, 2018
  • Image attribution tooltip
    Danielle Ternes
    Image attribution tooltip

    What businesses can learn from election security vulnerabilities

    It's inevitable that voting machines will be hacked, according to Absolute's Josh Mayfield. The real question is how widespread it will be and whether a catastrophe can be avoided.

    By Oct. 30, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As federal policy lags, state legislative pipeline is more important for CIOs

    California is a good place to look to gauge where state policy is headed. 

    By Alex Hickey • Oct. 29, 2018
  • Highest-paying IT certifications and why they matter

    Companies turn away from "four-year-degree-itis" to widen the talent pool.

    By Naomi Eide • Oct. 26, 2018
  • 95% of companies report cybersecurity culture disconnect

    Moving away from a checkbox mindset and toward a collaborative view can help establish a culture of shared reasonability for security. 

    By Samantha Schwartz • Oct. 26, 2018
  • Apple's Cook pushes for US privacy law, with GDPR model in mind

    As scrutiny around handling of user data grows, a more comprehensive, countrywide law would potentially give Apple an edge over competitors.

    By Peter Adams • Oct. 25, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    'Inherited' code flaws in software supply chains invite security risk

    Sometimes a flaw's severity isn't known until the damage has been done.

    By Samantha Schwartz • Oct. 24, 2018
  • Mega cybersecurity coalition courts Walmart, Microsoft for next-generation defense

    The coalition is looking to integrate cybersecurity from product design, using it as an active part of the business rather than a defense mechanism.

    By Oct. 23, 2018
  • Organizations need to care and tend to SaaS apps 'like a puppy'

    When SaaS is not trained appropriately, it can get unruly and expose a company to a range of implications. 

    By Samantha Schwartz • Oct. 22, 2018
  • Why security teams are last to adopt the cloud

    "Perimeters are dissolving," and people are beginning to ask why they need firewall on their network when it can be in the cloud.

    By Samantha Schwartz • Oct. 16, 2018
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip
    Deep Dive

    Modern-day bank robbing: How hackers are becoming public enemy No. 1

    The internet is the getaway car and malware is the firearm. 

    By Samantha Schwartz • Oct. 15, 2018
  • Facebook attackers accessed personal data of 29M users in breach

    The breach of tens of millions of users' personal information is a huge bump in the road for a company that has been grappling with user trust and privacy issues this year.

    By Oct. 12, 2018
  • Los Angeles to expand cybersecurity lab

    Bolstered by a $3 million federal grant, the city will expand the capabilities of a public-private partnership to protect against cyberattacks.

    By Jason Plautz • Oct. 12, 2018
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip

    Online cybersecurity training propels students into industry jobs

    More affordable for students, online training programs like Cybrary focus on real-world applications and can help workers expand their existing knowledge base or pivot careers entirely.

    By Naomi Eide • Oct. 12, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Business continuity planning proves crucial for disaster recovery

    The cost per record hit in data breaches is rising, but businesses with continuity plans in place can reduce escalating costs of an incident.

    By Oct. 10, 2018
  • Why did Google+ wait 7 months to disclose a bug?

    The public is demanding transparency into how companies are handling consumer data, and breaches could weaken Google's argument against a rigid U.S. privacy law. 

    By Samantha Schwartz • Oct. 9, 2018
  • 10 cybersecurity experts to follow on Twitter in 2018

    Often full of industry insider jokes, security researchers on Twitter offer something many other accounts don't have: a voice of dutiful skepticism.

    By Samantha Schwartz • Oct. 9, 2018
  • Deep Dive

    Why us? 6 months after ransomware attack Atlanta has no answers

    It's possible a vulnerability was found during a random scan and a hacker said, "we got a live one here," according to a security advisor.

    By Samantha Schwartz • Oct. 4, 2018
  • Image attribution tooltip
    Alex Hickey
    Image attribution tooltip

    'Punching above its weight,' FTC needs more rule-making power, resources, commissioner says

    The growing power of the technology industry and the impacts of massive data breaches are pushing the commission to reevaluate its tech regulation and the use of personal data.

    By Oct. 3, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    After Facebook's breach, attention turns toward motive and potential nation state perpetrators

    The underlying data behind profiles — public or not — are ripe targets for malicious actors and those looking to spread misinformation.

    By Naomi Eide • Oct. 1, 2018
  • California passes net neutrality law, but DOJ sues over attempt to 'frustrate federal policy'

    The state Silicon Valley calls home frequently sets the tone for what eventually becomes national rules for technology best practices. 

    By Samantha Schwartz • Oct. 1, 2018
  • 50M Facebook accounts breached following 'security issue'

    The social network is resetting the "access tokens" of 90 million accounts — 40 million of which weren't compromised, but were reset as a precaution.

    By Naomi Eide • Sept. 28, 2018