Security: Page 39


  • Deep Dive

    To strategically increase your city's cyber resiliency, take a page from Rotterdam

    The city of Rotterdam leads the way internationally on cyber resiliency in its port system, which relies extensively on automation and digitization of logistics operations.

    By Chris Teale • Feb. 22, 2018
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip

    Expect hackers to build off of WannaCry, Nyetya in 2018

    Hackers are finding new ways to navigate through a network, including manipulating existing malware strategies to self-propagate, according to a Cisco report.

    By Samantha Schwartz • Feb. 21, 2018
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • US spent up to $109B on cybercrimes in 2016. How much will it spend in 2018?

    The White House officially declared the Russian military responsible for last year's Nyetya wiper.

    By Samantha Schwartz • Feb. 20, 2018
  • Will GDPR lead to an uptick in ransomware?

    CEOs were the most spoofed and CFOs were the most targeted by business email scams in 2017, according to a Trend Micro report. 

    By Feb. 20, 2018
  • Intel ups bug bounty payouts to $250K

    The company is opening up its bug bounty program to all security researchers and prioritizing hardware flaws over firmware and software vulnerabilities

    By Naomi Eide • Feb. 15, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip
    Deep Dive

    100 days to GDPR: How Box got ready

    Companies need to begin looking at data protection as a combination of data security and data privacy, according to Crispen Maung, VP of compliance at Box.

    By Feb. 14, 2018
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax taps Home Depot's CISO to retool security

    What's key for Equifax is to fully understand its networks and install a security strategy that can patch and respond to threats in a timely manner.

    By Naomi Eide • Feb. 13, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip
    Deep Dive

    Technology of love: Between the sheets of OkCupid's amorous applications

    Big data, the cloud, cybersecurity and software may play a bigger role in your love life than you think.

    By Feb. 13, 2018
  • Olympics tech off to a tough start with server attacks and expanded malware

    "It is clear attacks are ongoing and are likely to continue throughout the duration of the games. What is yet to be determined is if actors are working simply to gain disruption or if their motives are greater," according to McAfee.

    By Feb. 12, 2018
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Hackers hijack water utility servers with 'cryptomining' malware

    It is most likely kind of an "accident" after some hackers were scanning "the internet [to] look for processing resources and this was just the one," said Ilan Brada, CEO of Radiflow, in an interview with CIO Dive.

    By Samantha Schwartz • Feb. 9, 2018
  • Google bug bounty program shelled out $2.9M last year

    While a prize of more than $100,000 may make a sweat break out on most CIOs' brows, in reality most bug bounty payouts come in at a few hundred dollars — and this price pales in comparison to the cost of a breach. 

    By Feb. 8, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Deep Dive

    Will the greatest feat at the Pyeongchang Olympics be staving off cyberattacks?

    With disparate sets of temporary digital infrastructure and thousands of endpoints ripe for exploitation, the Winter Olympics is a veritable hub for cybercrime.

    By Feb. 8, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    With expansive security risks targeting businesses, companies pay premium for tailored cyber insurance

    In the past, some businesses have relied on existing insurance policies to cover losses and liabilities. But policies like kidnap insurance do not cover ransomware demands. 

    By Naomi Eide • Feb. 7, 2018
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    44% of cloud apps exposed to at least one malware strand

    About one-third of organizations had at least one threat identified in a SaaS application, according to a new Bitglass report. 

    By Samantha Schwartz • Feb. 7, 2018
  • Mixpanel's software is 'inadvertently' stealing user passwords

    Almost 25% of Mixpanel's customer base, which remains confidential, was impacted.

    By Samantha Schwartz • Feb. 6, 2018
  • Apple, Cisco, Allianz and Aon take on ransomware

    The coupled solution creates a foothold to spread Apple's devices and Cisco's ransomware detection to more enterprise customers. 

    By Feb. 6, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Media and retail falling behind in GDPR compliance, Forrester says

    Many firms outside the EU do not think GDPR will apply to them, but given its extraterritorial effect "the percentage of companies not affected by GDPR is small," reports Forrester.

    By Feb. 5, 2018
  • 'Runaway algorithms' are wreaking havoc on consumer privacy, DuckDuckGo CEO says

    Google and Facebook are responsible for about 63% of all digital advertising through their collection of personal data, Gabriel Weinberg, writes in a commentary piece for CNBC. 

    By Samantha Schwartz • Feb. 2, 2018
  • Image attribution tooltip
    Extreme Networks
    Image attribution tooltip
    Deep Dive

    NFL CIO: Making the 2018 Super Bowl a win with technology

    Michelle McKenna-Doyle, CIO of the NFL, and John Brams, director of Hospitality, Sports and Entertainment at Extreme Networks, spoke with CIO Dive about the technology going on behind the scenes Sunday.

    By Feb. 2, 2018
  • Eternally(Blue) for you: Botnet mines $3.6M in crypotcurrency

    The botnet found its legs in the EternalBlue exploit — the same one that was used to spread the WannaCry malware attack.

    By Samantha Schwartz • Feb. 2, 2018
  • GDPR: Lose money if you comply, lose money if you don't

    The GDPR narrative tends to focus on costs associated with noncompliance, but companies could face losses by complying as users gain control over their data. 

    By Feb. 1, 2018
  • Image attribution tooltip
    Wikimedia Commons
    Image attribution tooltip
    Deep Dive

    How the chip industry is keeping calm during a 'Meltdown'

    The scope of the flaws outpaces Intel's ability to help all customers recover. But what happened leading up to Intel's second hold on security patches?

    By Samantha Schwartz • Jan. 30, 2018
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    The list no one wants to top: The most dangerous states and generations for cybersecurity

    Cybercrimes are on the sharpest rise in Florida, Michigan, Illinois, Missouri and California. Will user prioritization of security over convenience offset the trend?

    By Jan. 30, 2018
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    There's an app for that, but is there a service?

    Security challenges have remained largely unchanged year-over-year, but confidence in the security of expanding multi-cloud environments is waning.

    By Jan. 29, 2018
  • Intel will release Meltdown-resistant patches later this year

    The company remains cautious about the financial impact the vulnerabilities could have on 2018 earnings. 

    By Samantha Schwartz • Jan. 29, 2018