Security: Page 33
-
More malware strains in H1 than all of last year bodes poorly for IoT
The Mirai family remains the preferred choice of hackers looking to infiltrate internet of things devices, accounting for almost 16% of attacks.
By Alex Hickey • Sept. 19, 2018 -
Data breaches take long-term toll on companies' stock performance
The aftermath of a breach puts a lot of strain on a company's ability to market itself as trustworthy.
By Samantha Schwartz • Sept. 17, 2018 -
Organizations are playing Russian roulette with malicious emails
It's important companies adopt learning and development practices so employees can better serve as the last line of defense.
By Samantha Schwartz • Sept. 14, 2018 -
Equifax breach, 1 year later: Unabating corporate cybersecurity negligence undercuts consumers
"Nobody went to jail," Kurtis Minder, CEO of GroupSense, a cyber reconnaissance firm, said following the lack of action taken by regulators.
By Naomi Eide • Sept. 7, 2018 -
2018 enterprise technology IPOs: Fall update
The late spring and summer months brought a new crop of IPOs with six enterprise technology companies concentrated in the fields of cybersecurity and software as a service.
By Alex Hickey • Sept. 7, 2018 -
T-Mobile suffered another data breach, but industry 'too jaded' to care
Security shortcomings have become so routine it is difficult to remain clued into the seriousness of the incident.
By Naomi Eide • Aug. 27, 2018 -
Deep Dive
From acquisitions to audits: What's going on with Symantec?
Though Symantec's stock has taken a notable hit since May, its products remain viable. And yet the dark cloud of an audit remains.
By Samantha Schwartz • Aug. 24, 2018 -
Health orgs aren't fully following IT safety advice, survey finds
The low compliance rate shows healthcare organizations have a long way to go to properly protect patient information.
By Les Masterson • Aug. 20, 2018 -
Q&A
After a 3-day cyberattack simulation, 'it's like crickets' for executives to discuss flaws, vulnerabilities
The city conducted the Jack Voltaic 2.0 exercise to answer a simple question: "If all sectors are under a coordinated cyberattack, would we be aware and able to handle it from within?"
By Katie Pyzyk • Aug. 17, 2018 -
Small business cybersecurity act becomes law, but is it enough?
The amendment requires NIST to provide cybersecurity resources for small businesses, but incentivizing small businesses to take a more active role and utilize them may prove a challenge.
By Alex Hickey • Aug. 16, 2018 -
Cisco evolving its product portfolio and the 'strategy is working,' CEO says
The company has embraced overhauling its product portfolio, revamping offerings for a more security-conscious world.
By Naomi Eide • Aug. 16, 2018 -
Juggling high-profile problems, Uber hires security officer
Matt Olsen joins the ride sharing company after Uber's former chief security officer was fired in the wake of the company's breach revelations last fall.
By Alex Hickey • Aug. 15, 2018 -
Privacy quandary: Companies track users' 'behavioral biometrics' in the name of security
Organizations that use behavioral biometrics to monitor customers carry a risk and have to ensure the data they're surveilling is not personal information.
By Samantha Schwartz • Aug. 15, 2018 -
Intel chip saga continues: 'Foreshadow' vulnerabilities disclosed
Dubbed 'Foreshadow,' the three flaws could be particularly devastating because they also allow malicious actors to access information in other virtual machines on the same cloud infrastructure.
By Alex Hickey • Aug. 15, 2018 -
Attack of the office relic: Researchers find exploitable flaws in fax machines, printers
While unplugging a printer or fax machine from its power supply can stop an intrusion, it's not a fix that many companies opt for.
By Samantha Schwartz • Aug. 13, 2018 -
Why product testing companies are finally upping scrutiny on security
Third parties are working to improve product security, one review at a time.
By Alex Hickey • Aug. 9, 2018 -
To make systems safer, put more bugs in them
New York University security researchers found chaff bugs can be designed as "non-exploitable" when conditions are constrained and controlled.
By Samantha Schwartz • Aug. 8, 2018 -
Can industry overcome political differences to work with Trump admin on cybersecurity?
Vice President Mike Pence and DHS Secretary Kirstjen Nielsen renewed calls for public-private cybersecurity partnerships through government institutions.
By Alex Hickey • Aug. 7, 2018 -
Breaches set to taper off in 2018, but deep rooted vulnerabilities remain
What impact are the 300,000 open security jobs having on the number of data breaches occurring at companies?
By Samantha Schwartz • Aug. 7, 2018 -
Can Symantec get past its legacy brand image?
The company has to battle perceptions of being a legacy brand out of place in the modern market, so fixing its brand may be more of a sales and marketing issue than a technology one.
By Alex Hickey • Aug. 6, 2018 -
With $2.35B Duo Security purchase, Cisco stakes claim on end-to-end network access
It's a new security era for Cisco, which is traditionally rooted in networking technology.
By Naomi Eide • Aug. 3, 2018 -
Private sector pay and opportunity pose big threat to federal talent retention
Federal agencies can effectively choose to ignore policies because they are outdated or don't make sense for the current framework.
By Samantha Schwartz • Aug. 3, 2018 -
Cyberattacks targeting the software supply chain nearly double
As more data are managed on the cloud, supply chain managers must understand the vulnerabilities of both emerging and legacy technology.
By Gary Wollenhaupt • Aug. 2, 2018 -
HP, Bugcrowd to pay researchers to get printers out of a jam
Through the bug bounty program, the companies want their invite-only security researchers to hone in on vulnerabilities on the firmware level.
By Samantha Schwartz • Aug. 2, 2018 -
DHS walks back utility cyber warnings as Southern CEO says no grid emergency
Hackers cannot cause widespread power outages at this time, DHS said, tempering statements the agency made last week warning that cyber criminals could "throw switches" on the grid.
By Gavin Bade • Aug. 1, 2018