Security: Page 32


  • Uber's record $148M fine highlights harsh repercussions for data breach disclosure failures

    The lesson from Uber is failure to disclose has a negative impact, a message to big tech companies that they are not above the law.

    By Naomi Eide • Sept. 27, 2018
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    'It's too late' to diversify cybersecurity workforce

    By the time young students are old enough to enter the security workforce, cybersecurity will be "passé," said Dr. Alissa Johnson, VP and CISO of Xerox. 

    By Samantha Schwartz • Sept. 27, 2018
  • Why CISOs are not setting the business risk posture aymore

    There is a widespread understanding among security professionals that the role of the CISO is evolving, as well as the role of IT.

    By Samantha Schwartz • Sept. 27, 2018
  • With GDPR complaints rising, UK regulator quietly issued notice of violation

    A Canadian firm that worked with political organizations to target ads in the UK was issued the notice in July and given 30 days to comply. 

    By Sept. 26, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Digital transformation stalls when privacy, ethics, trust lag

    "Privacy is not dead, but we're going to have to fight for it if we want it," said Laura Koetzle, VP and group director at Forrester Research.

    By Sept. 26, 2018
  • Cryptojacking takes cyber threats to the 'Wild West'

    The attacks are random and aggressive, forcing victims to maintain constant offensive and defensive security measures. 

    By Samantha Schwartz • Sept. 25, 2018
  • Underlying security issues exposed by State Department's email breach

    Oregon Senator Ron Wyden released a letter voicing concern about malicious cyber activity in the personal accounts and devices of Senate members. 

    By Samantha Schwartz • Sept. 21, 2018
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Big tech is rolling out tools to counter AI bias. Is it enough?

    There are three levels of failure for AI algorithms: integrity of data, integrity of algorithms and the decision-maker. These tools tackle the first two. 

    By Sept. 21, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    More malware strains in H1 than all of last year bodes poorly for IoT

    The Mirai family remains the preferred choice of hackers looking to infiltrate internet of things devices, accounting for almost 16% of attacks.

    By Sept. 19, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data breaches take long-term toll on companies' stock performance

    The aftermath of a breach puts a lot of strain on a company's ability to market itself as trustworthy. 

    By Samantha Schwartz • Sept. 17, 2018
  • Organizations are playing Russian roulette with malicious emails

    It's important companies adopt learning and development practices so employees can better serve as the last line of defense.

    By Samantha Schwartz • Sept. 14, 2018
  • Image attribution tooltip
    Kendall, Industry Dive
    Image attribution tooltip

    Equifax breach, 1 year later: Unabating corporate cybersecurity negligence undercuts consumers

    "Nobody went to jail," Kurtis Minder, CEO of GroupSense, a cyber reconnaissance firm, said following the lack of action taken by regulators.

    By Naomi Eide • Sept. 7, 2018
  • 2018 enterprise technology IPOs: Fall update

    The late spring and summer months brought a new crop of IPOs with six enterprise technology companies concentrated in the fields of cybersecurity and software as a service.

    By Sept. 7, 2018
  • Image attribution tooltip
    Flickr
    Image attribution tooltip

    T-Mobile suffered another data breach, but industry 'too jaded' to care

    Security shortcomings have become so routine it is difficult to remain clued into the seriousness of the incident.

    By Naomi Eide • Aug. 27, 2018
  • Image attribution tooltip
    Kendall Davis / Supply Chain Dive
    Image attribution tooltip
    Deep Dive

    From acquisitions to audits: What's going on with Symantec?

    Though Symantec's stock has taken a notable hit since May, its products remain viable. And yet the dark cloud of an audit remains.

    By Samantha Schwartz • Aug. 24, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Health orgs aren't fully following IT safety advice, survey finds

    The low compliance rate shows healthcare organizations have a long way to go to properly protect patient information.

    By Les Masterson • Aug. 20, 2018
  • Q&A

    After a 3-day cyberattack simulation, 'it's like crickets' for executives to discuss flaws, vulnerabilities

    The city conducted the Jack Voltaic 2.0 exercise to answer a simple question: "If all sectors are under a coordinated cyberattack, would we be aware and able to handle it from within?"

    By Katie Pyzyk • Aug. 17, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Small business cybersecurity act becomes law, but is it enough?

    The amendment requires NIST to provide cybersecurity resources for small businesses, but incentivizing small businesses to take a more active role and utilize them may prove a challenge. 

    By Aug. 16, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cisco evolving its product portfolio and the 'strategy is working,' CEO says

    The company has embraced overhauling its product portfolio, revamping offerings for a more security-conscious world.

    By Naomi Eide • Aug. 16, 2018
  • Juggling high-profile problems, Uber hires security officer

    Matt Olsen joins the ride sharing company after Uber's former chief security officer was fired in the wake of the company's breach revelations last fall.

    By Aug. 15, 2018
  • Privacy quandary: Companies track users' 'behavioral biometrics' in the name of security

    Organizations that use behavioral biometrics to monitor customers carry a risk and have to ensure the data they're surveilling is not personal information.

    By Samantha Schwartz • Aug. 15, 2018
  • Intel chip saga continues: 'Foreshadow' vulnerabilities disclosed

    Dubbed 'Foreshadow,' the three flaws could be particularly devastating because they also allow malicious actors to access information in other virtual machines on the same cloud infrastructure.

    By Aug. 15, 2018
  • Attack of the office relic: Researchers find exploitable flaws in fax machines, printers

    While unplugging a printer or fax machine from its power supply can stop an intrusion, it's not a fix that many companies opt for.

    By Samantha Schwartz • Aug. 13, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Why product testing companies are finally upping scrutiny on security

    Third parties are working to improve product security, one review at a time.

    By Aug. 9, 2018
  • To make systems safer, put more bugs in them

    New York University security researchers found chaff bugs can be designed as "non-exploitable" when conditions are constrained and controlled.

    By Samantha Schwartz • Aug. 8, 2018