Security: Page 31


  • There's 'no way' customers would migrate from Oracle to Amazon database software, Ellison says

    High-profile companies have worked to migrate off Oracle database technology, sparking a war of words for Larry Ellison, Oracle's chairman and CTO. 

    By Naomi Eide • Dec. 18, 2018
  • What do Kanye, Nutella and Google have in common? Bad passwords

    From celebrities to the national government, poor password hygiene continues to threaten network integrity.

    By Alex Hickey • Dec. 13, 2018
  • 'Cyber espionage' group targets sensitive telecom, government IT services data

    Seedworm — also known as MuddyWater —  is the only known hacker group to leverage the Powermud backdoor. 

    By Samantha Schwartz • Dec. 12, 2018
  • Image attribution tooltip
    Getty / Edited by Industry Dive
    Image attribution tooltip

    Equifax's 'aggressive growth strategy' contributed to IT complexity and failure

    The U.S. House of Representatives found a combination of legacy systems and integrations increased the likelihood of the firm's data breach. 

    By Samantha Schwartz • Dec. 11, 2018
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    Digital security takes a backseat to customer experience, Equifax report finds

    As digital security becomes a greater business priority, responsibility is shifting away from just the CIO and CISO. 

    By Dec. 10, 2018
  • Opinion

    Don't let vendors put customers — and a business's reputation — at risk

    In addition to security and data protection demands, organizations must be vigilant about how third-party service providers approach these obligations.

    By Steve Richardson • Dec. 10, 2018
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    Quick response to 1st major Kubernetes flaw could strengthen trust in the system

    Big providers demonstrated they can identify, fix and patch the serious security issue in a timely manner, according to StackRox's Wei Lien Dang.

    By Dec. 5, 2018
  • Image attribution tooltip
    Elizabeth Regan/CIO Dive
    Image attribution tooltip

    More than passwords: Quora breach highlights risks of third-party authentication

    While the company did report and act on the incident in a timely manner, the compromise of consumer data is still serious. 

    By Dec. 5, 2018
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip
    Dive Awards

    CISO of the Year: Jamil Farshchi, Equifax

    Equifax brought on Jamil Farshchi, the former CISO of Home Depot, after suffering a catastrophic breach in 2017.

    By Dec. 3, 2018
  • Marriott International, hotel
    Image attribution tooltip
    Retrieved from Marriott on December 03, 2018
    Image attribution tooltip

    Marriott's cybersecurity nightmare: A lesson in M&A risks

    When an acquisition takes place, security continuity isn't always part of the contract. Now, the cost of Starwood is more than Marriott initially bargained for. 

    By Samantha Schwartz • Dec. 3, 2018
  • Image attribution tooltip
    Whistle Sports
    Image attribution tooltip

    500M hit by Marriott data breach; intrusion undetected since 2014

    The perpetrators had copied and encrypted guest information and begun the process of removing it.

    By Samantha Schwartz • Nov. 30, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    AWS takes on shadow IT with customizable software marketplace

    Most IT professionals want to ignore software as a service applications, but they can't afford to do so because eventually a enough of it will demand attention.

    By Samantha Schwartz • Nov. 28, 2018
  • Uber hit with $1.2M in fines for 2016 data breach

    Regulators from the U.K. and the Netherlands penalized Uber, which tried to cover up the breach that compromised 57 million worldwide accounts.

    By Samantha Schwartz • Nov. 27, 2018
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cyberthreats swallow SMBs burdened by supply chain attacks

    A sufficient security posture is hindered by a lack of personnel, small budgets and general confusion over how to protect against cyberattacks.

    By Samantha Schwartz • Nov. 26, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip
    Deep Dive

    'Regulation without teeth is just a document': 6 months in, industry awaits major GDPR enforcement

    Experts worry that without significant enforcement action in 2019, businesses could stop caring about the data privacy regulation. 

    By Nov. 26, 2018
  • BlackBerry to buy Cylance for $1.4B as company continues security evolution

    After retiring its mobile phone in 2016, the company has found new footing and confidence in mobile security. 

    By Samantha Schwartz • Nov. 16, 2018
  • Gotta catch 'em all: Pokémon International complies with data privacy standards

    The Pokémon Company International, following the successes of Pokémon Go, is learning the rules of the world its app has taken by storm.

    By Nov. 14, 2018
  • IT professionals looking for work can name their price

    Companies of all sizes plan to increase their cybersecurity talent, but smaller organizations also want more skills for DevOps, hardware and infrastructure. 

    By Samantha Schwartz • Nov. 7, 2018
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    What digital change means for cybersecurity: Rip up the playbook and take risks

    Playbooks are good learning tools, but if attackers aren't following the rules, why should anyone else?

    By Samantha Schwartz • Nov. 1, 2018
  • CIOs and CISOs no longer solely own cybersecurity responsibility

    "Very few people own consequence right now," said William Evanina, director at the Office of the National Intelligence, but "we should all own consequence."

    By Samantha Schwartz • Oct. 31, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    How the nastiest ransomware and flaws get their names

    Which one of these was not the name of an attack/flaw: Heartbleed, Masacre3, Venom, Petya, Frogwarts? Read to find out. 

    By Samantha Schwartz • Oct. 31, 2018
  • Image attribution tooltip
    Danielle Ternes
    Image attribution tooltip

    What businesses can learn from election security vulnerabilities

    It's inevitable that voting machines will be hacked, according to Absolute's Josh Mayfield. The real question is how widespread it will be and whether a catastrophe can be avoided.

    By Oct. 30, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As federal policy lags, state legislative pipeline is more important for CIOs

    California is a good place to look to gauge where state policy is headed. 

    By Alex Hickey • Oct. 29, 2018
  • 95% of companies report cybersecurity culture disconnect

    Moving away from a checkbox mindset and toward a collaborative view can help establish a culture of shared reasonability for security. 

    By Samantha Schwartz • Oct. 26, 2018
  • Highest-paying IT certifications and why they matter

    Companies turn away from "four-year-degree-itis" to widen the talent pool.

    By Naomi Eide • Oct. 26, 2018