Security: Page 37


  • With recovery costs reaching nearly $2.7M, should Atlanta have paid the ransomware demand?

    The recovery costs were more than 50 times the $51,000 demand to unlock Atlanta's technical infrastructure.

    By Samantha Schwartz • April 24, 2018
  • Deep Dive

    How cybercriminals get in, and what to do to stop them

    No matter how good password management gets, hackers always seem to be one step ahead. Here's how they do it and steps businesses can take to stop it.

    By April 23, 2018
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Deep Dive

    Practices 7 technology pros use to keep hackers at bay

    Hackers are going for the easily compromised targets, so "you don't have to outrun the bear, you just have to outrun the other guy." 

    By Naomi Eide , April 23, 2018
  • Deep Dive

    Faces, fingers and behavior: The future of passwords

    A passwordless future would place the onus of securing identities on biometrics and behavioral insights, rather than words, numbers, characters and phrases.

    By Naomi Eide • April 23, 2018
  • Deep Dive

    5 password management trends businesses need to know

    Despite improving technology, password security continues to plague businesses. But understanding what's going on in the space can make counteracting malicious account compromise a little easier.

    By Naomi Eide , Samantha Schwartz , April 23, 2018
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip
    Deep Dive

    Securing logins ... what's the worst that could happen?

    Are passwords the sole cause of breaches? Absolutely not, but because of their "brittleness" they stand firmly as a contributing part of the security problem.

    By Samantha Schwartz • April 23, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    RSAC's mobile app API flaw caused mini data leak

    In 2014, a similar flaw in the conference's app left the attendees' personal information, including titles, employers and nationality, vulnerable.

    By Samantha Schwartz • April 23, 2018
  • Oracle's patch updates include 254 security fixes

    Customers who failed to update vulnerabilities with already available patches are still experiencing attacks.

    By Samantha Schwartz • April 20, 2018
  • Deep Dive

    RSAC: 3 key cyberthreats to watch in 2018

    Data repository leaks, cryptomining and vulnerable industrial code are growing cyberthreats in the enterprise, but companies can fight back.

    By Samantha Schwartz • April 19, 2018
  • Image attribution tooltip
    Flickr
    Image attribution tooltip

    Threat hunting 101: Security experts weigh merits of automating an evolving field

    "A bear is a bear" no matter what "forest" or network they are intruding in, according to a CTO. The best leads to take while hunting for those bears include looking for reconnaissance tools.

    By Samantha Schwartz • April 18, 2018
  • Teaching AI to detect malware, one data set at a time

    Working together through commercial agreements and opening data sets for research and algorithm training can bolster enterprise cybersecurity.

    By April 18, 2018
  • Image attribution tooltip
    Samantha Schwartz/CIO Dive
    Image attribution tooltip

    Microsoft offers IoT solution as answer to hardware security shortcomings

    To take “cybersecurity from an art to a science,” Microsoft is engineering a more secure edge with Azure Sphere, according to President Brad Smith.

    By Samantha Schwartz • April 17, 2018
  • SamSam, Locky, Cerber: In ransomware, past strains can reveal cyberattack motives

    Just because hackers left a branded handprint on WannaCry and NotPetya does not mean companies should know what to expect from future attacks.

    By Samantha Schwartz • April 17, 2018
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip

    To improve cybersecurity diversity, destroy the 'hacker in a hoodie' stereotype

    Cybersecurity is considered "pale, male and stale," said Kim Jones at RSAC. Without an image makeover, it's doomed to remain stagnant and homogenous.

    By Naomi Eide • April 17, 2018
  • Image attribution tooltip
    Raytheon
    Image attribution tooltip

    The students, startups and tech poised to disrupt cybersecurity

    Hackers and crimeware come back year after year with a vengeance. Will the rising stars be able to overcome talent limitations to beat them?

    By April 16, 2018
  • Image attribution tooltip
    Unsplash
    Image attribution tooltip

    Gmail is going 'confidential' to prevent unintended data sharing

    The redesign of the platform will address companies' concerns over employee email habits.

    By Samantha Schwartz • April 16, 2018
  • FTC expands Uber settlement following last year's breach revelations

    Each violation of an issued consent order from the agency can result in a civil penalty up to $41,484.

    By Samantha Schwartz • April 13, 2018
  • Are gamers the answer to the cybersecurity skills gap?

    Demand is outpacing talent in the cybersecurity field, but a new report from McAfee suggests that gamers might just be the answer.

    By Riia O'Donnell • April 12, 2018
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip
    Deep Dive

    5 things to watch at RSA Conference 2018

    If you haven't created a RSAC bingo card yet, now's the time. Be on the lookout for the overuse of terms like "nation state actors," "cyberwar" and "GDPR."

    By Naomi Eide • April 11, 2018
  • Mozilla: Facebook, Google 'consolidation of power' undermining users' privacy

    When companies gather overwhelming amounts of personal data, a lack of healthy competition constricts the innovation pipeline, according to Mozilla. 

    By Samantha Schwartz • April 11, 2018
  • Image attribution tooltip
    Wikimedia Commons
    Image attribution tooltip
    Deep Dive

    Facebook has 911 MB worth of data on me, how much should I really care?

    Many have a laissez faire approach to Facebook in a post-Cambridge Analytica world, and maybe that's okay.

    By Samantha Schwartz • April 6, 2018
  • Breaches galore: Malware attack on vendor at heart of Delta, Sears data breaches

    From soup to passports to shoes, businesses across industries were victims to this week's latest security breaches.

    By Samantha Schwartz • April 6, 2018
  • Image attribution tooltip
    CIO Dive
    Image attribution tooltip

    Ransomware in 2017 set industry up for distraction, destruction in 2018

    Whether it's misjudgment, misconfiguration, outdated software or falling for a phishing scheme, humans play a hand in their cyber woes.

    By Samantha Schwartz • April 5, 2018
  • Atlanta still struggling to get out from ransomware attack's grip

    Attackers appeared to change some documents, with some files tweaked to include "weapologize" and "imsorry."

    By Samantha Schwartz • April 3, 2018
  • Opinion

    More than money: How to woo cybersecurity professionals

    If expectations aren't clear and opinions aren't valued, cybersecurity professionals will move on to another opportunity where they see an easier road to career success. 

    By Wesley Simpson • April 2, 2018