Security: Page 32


  • Apple's Cook pushes for US privacy law, with GDPR model in mind

    As scrutiny around handling of user data grows, a more comprehensive, countrywide law would potentially give Apple an edge over competitors.

    By Peter Adams • Oct. 25, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    'Inherited' code flaws in software supply chains invite security risk

    Sometimes a flaw's severity isn't known until the damage has been done.

    By Samantha Schwartz • Oct. 24, 2018
  • Mega cybersecurity coalition courts Walmart, Microsoft for next-generation defense

    The coalition is looking to integrate cybersecurity from product design, using it as an active part of the business rather than a defense mechanism.

    By Oct. 23, 2018
  • Organizations need to care and tend to SaaS apps 'like a puppy'

    When SaaS is not trained appropriately, it can get unruly and expose a company to a range of implications. 

    By Samantha Schwartz • Oct. 22, 2018
  • Why security teams are last to adopt the cloud

    "Perimeters are dissolving," and people are beginning to ask why they need firewall on their network when it can be in the cloud.

    By Samantha Schwartz • Oct. 16, 2018
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip
    Deep Dive

    Modern-day bank robbing: How hackers are becoming public enemy No. 1

    The internet is the getaway car and malware is the firearm. 

    By Samantha Schwartz • Oct. 15, 2018
  • Facebook attackers accessed personal data of 29M users in breach

    The breach of tens of millions of users' personal information is a huge bump in the road for a company that has been grappling with user trust and privacy issues this year.

    By Oct. 12, 2018
  • Los Angeles to expand cybersecurity lab

    Bolstered by a $3 million federal grant, the city will expand the capabilities of a public-private partnership to protect against cyberattacks.

    By Jason Plautz • Oct. 12, 2018
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    Online cybersecurity training propels students into industry jobs

    More affordable for students, online training programs like Cybrary focus on real-world applications and can help workers expand their existing knowledge base or pivot careers entirely.

    By Naomi Eide • Oct. 12, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Business continuity planning proves crucial for disaster recovery

    The cost per record hit in data breaches is rising, but businesses with continuity plans in place can reduce escalating costs of an incident.

    By Oct. 10, 2018
  • Why did Google+ wait 7 months to disclose a bug?

    The public is demanding transparency into how companies are handling consumer data, and breaches could weaken Google's argument against a rigid U.S. privacy law. 

    By Samantha Schwartz • Oct. 9, 2018
  • 10 cybersecurity experts to follow on Twitter in 2018

    Often full of industry insider jokes, security researchers on Twitter offer something many other accounts don't have: a voice of dutiful skepticism.

    By Samantha Schwartz • Oct. 9, 2018
  • Deep Dive

    Why us? 6 months after ransomware attack Atlanta has no answers

    It's possible a vulnerability was found during a random scan and a hacker said, "we got a live one here," according to a security advisor.

    By Samantha Schwartz • Oct. 4, 2018
  • Image attribution tooltip
    Alex Hickey
    Image attribution tooltip

    'Punching above its weight,' FTC needs more rule-making power, resources, commissioner says

    The growing power of the technology industry and the impacts of massive data breaches are pushing the commission to reevaluate its tech regulation and the use of personal data.

    By Oct. 3, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    After Facebook's breach, attention turns toward motive and potential nation state perpetrators

    The underlying data behind profiles — public or not — are ripe targets for malicious actors and those looking to spread misinformation.

    By Naomi Eide • Oct. 1, 2018
  • California passes net neutrality law, but DOJ sues over attempt to 'frustrate federal policy'

    The state Silicon Valley calls home frequently sets the tone for what eventually becomes national rules for technology best practices. 

    By Samantha Schwartz • Oct. 1, 2018
  • 50M Facebook accounts breached following 'security issue'

    The social network is resetting the "access tokens" of 90 million accounts — 40 million of which weren't compromised, but were reset as a precaution.

    By Naomi Eide • Sept. 28, 2018
  • Uber's record $148M fine highlights harsh repercussions for data breach disclosure failures

    The lesson from Uber is failure to disclose has a negative impact, a message to big tech companies that they are not above the law.

    By Naomi Eide • Sept. 27, 2018
  • Image attribution tooltip
    Adobe Stock
    Image attribution tooltip

    'It's too late' to diversify cybersecurity workforce

    By the time young students are old enough to enter the security workforce, cybersecurity will be "passé," said Dr. Alissa Johnson, VP and CISO of Xerox. 

    By Samantha Schwartz • Sept. 27, 2018
  • Why CISOs are not setting the business risk posture aymore

    There is a widespread understanding among security professionals that the role of the CISO is evolving, as well as the role of IT.

    By Samantha Schwartz • Sept. 27, 2018
  • With GDPR complaints rising, UK regulator quietly issued notice of violation

    A Canadian firm that worked with political organizations to target ads in the UK was issued the notice in July and given 30 days to comply. 

    By Sept. 26, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Digital transformation stalls when privacy, ethics, trust lag

    "Privacy is not dead, but we're going to have to fight for it if we want it," said Laura Koetzle, VP and group director at Forrester Research.

    By Sept. 26, 2018
  • Cryptojacking takes cyber threats to the 'Wild West'

    The attacks are random and aggressive, forcing victims to maintain constant offensive and defensive security measures. 

    By Samantha Schwartz • Sept. 25, 2018
  • Underlying security issues exposed by State Department's email breach

    Oregon Senator Ron Wyden released a letter voicing concern about malicious cyber activity in the personal accounts and devices of Senate members. 

    By Samantha Schwartz • Sept. 21, 2018
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Big tech is rolling out tools to counter AI bias. Is it enough?

    There are three levels of failure for AI algorithms: integrity of data, integrity of algorithms and the decision-maker. These tools tackle the first two. 

    By Sept. 21, 2018