Security: Page 37
-
With recovery costs reaching nearly $2.7M, should Atlanta have paid the ransomware demand?
The recovery costs were more than 50 times the $51,000 demand to unlock Atlanta's technical infrastructure.
By Samantha Schwartz • April 24, 2018 -
Deep Dive
How cybercriminals get in, and what to do to stop them
No matter how good password management gets, hackers always seem to be one step ahead. Here's how they do it and steps businesses can take to stop it.
By Alex Hickey • April 23, 2018 -
Explore the Trendline➔
Getty Images
TrendlineIT Security
Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.
By CIO Dive staff -
Deep Dive
Practices 7 technology pros use to keep hackers at bay
Hackers are going for the easily compromised targets, so "you don't have to outrun the bear, you just have to outrun the other guy."
By Naomi Eide , Alex Hickey • April 23, 2018 -
Deep Dive
Faces, fingers and behavior: The future of passwords
A passwordless future would place the onus of securing identities on biometrics and behavioral insights, rather than words, numbers, characters and phrases.
By Naomi Eide • April 23, 2018 -
Deep Dive
5 password management trends businesses need to know
Despite improving technology, password security continues to plague businesses. But understanding what's going on in the space can make counteracting malicious account compromise a little easier.
By Naomi Eide , Samantha Schwartz , Alex Hickey • April 23, 2018 -
Deep Dive
Securing logins ... what's the worst that could happen?
Are passwords the sole cause of breaches? Absolutely not, but because of their "brittleness" they stand firmly as a contributing part of the security problem.
By Samantha Schwartz • April 23, 2018 -
RSAC's mobile app API flaw caused mini data leak
In 2014, a similar flaw in the conference's app left the attendees' personal information, including titles, employers and nationality, vulnerable.
By Samantha Schwartz • April 23, 2018 -
Oracle's patch updates include 254 security fixes
Customers who failed to update vulnerabilities with already available patches are still experiencing attacks.
By Samantha Schwartz • April 20, 2018 -
Deep Dive
RSAC: 3 key cyberthreats to watch in 2018
Data repository leaks, cryptomining and vulnerable industrial code are growing cyberthreats in the enterprise, but companies can fight back.
By Samantha Schwartz • April 19, 2018 -
Threat hunting 101: Security experts weigh merits of automating an evolving field
"A bear is a bear" no matter what "forest" or network they are intruding in, according to a CTO. The best leads to take while hunting for those bears include looking for reconnaissance tools.
By Samantha Schwartz • April 18, 2018 -
Teaching AI to detect malware, one data set at a time
Working together through commercial agreements and opening data sets for research and algorithm training can bolster enterprise cybersecurity.
By Alex Hickey • April 18, 2018 -
Microsoft offers IoT solution as answer to hardware security shortcomings
To take “cybersecurity from an art to a science,” Microsoft is engineering a more secure edge with Azure Sphere, according to President Brad Smith.
By Samantha Schwartz • April 17, 2018 -
SamSam, Locky, Cerber: In ransomware, past strains can reveal cyberattack motives
Just because hackers left a branded handprint on WannaCry and NotPetya does not mean companies should know what to expect from future attacks.
By Samantha Schwartz • April 17, 2018 -
To improve cybersecurity diversity, destroy the 'hacker in a hoodie' stereotype
Cybersecurity is considered "pale, male and stale," said Kim Jones at RSAC. Without an image makeover, it's doomed to remain stagnant and homogenous.
By Naomi Eide • April 17, 2018 -
The students, startups and tech poised to disrupt cybersecurity
Hackers and crimeware come back year after year with a vengeance. Will the rising stars be able to overcome talent limitations to beat them?
By Alex Hickey • April 16, 2018 -
Gmail is going 'confidential' to prevent unintended data sharing
The redesign of the platform will address companies' concerns over employee email habits.
By Samantha Schwartz • April 16, 2018 -
FTC expands Uber settlement following last year's breach revelations
Each violation of an issued consent order from the agency can result in a civil penalty up to $41,484.
By Samantha Schwartz • April 13, 2018 -
Are gamers the answer to the cybersecurity skills gap?
Demand is outpacing talent in the cybersecurity field, but a new report from McAfee suggests that gamers might just be the answer.
By Riia O'Donnell • April 12, 2018 -
Deep Dive
5 things to watch at RSA Conference 2018
If you haven't created a RSAC bingo card yet, now's the time. Be on the lookout for the overuse of terms like "nation state actors," "cyberwar" and "GDPR."
By Naomi Eide • April 11, 2018 -
Mozilla: Facebook, Google 'consolidation of power' undermining users' privacy
When companies gather overwhelming amounts of personal data, a lack of healthy competition constricts the innovation pipeline, according to Mozilla.
By Samantha Schwartz • April 11, 2018 -
Deep Dive
Facebook has 911 MB worth of data on me, how much should I really care?
Many have a laissez faire approach to Facebook in a post-Cambridge Analytica world, and maybe that's okay.
By Samantha Schwartz • April 6, 2018 -
Breaches galore: Malware attack on vendor at heart of Delta, Sears data breaches
From soup to passports to shoes, businesses across industries were victims to this week's latest security breaches.
By Samantha Schwartz • April 6, 2018 -
Ransomware in 2017 set industry up for distraction, destruction in 2018
Whether it's misjudgment, misconfiguration, outdated software or falling for a phishing scheme, humans play a hand in their cyber woes.
By Samantha Schwartz • April 5, 2018 -
Atlanta still struggling to get out from ransomware attack's grip
Attackers appeared to change some documents, with some files tweaked to include "weapologize" and "imsorry."
By Samantha Schwartz • April 3, 2018 -
Opinion
More than money: How to woo cybersecurity professionals
If expectations aren't clear and opinions aren't valued, cybersecurity professionals will move on to another opportunity where they see an easier road to career success.
By Wesley Simpson • April 2, 2018