Security: Page 4


  • The president joe biden stands behind a podium in front of the white house, shielding his eyes from the sun.
    Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    White House considers ban on ransom payments, with caveats

    Experts suggest the effort, a reversal from the administration's previous stance, is fraught with complications that could cause unintended consequences.

    By Matt Kapko • May 8, 2023
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    What do CIOs and other cyber experts do to manage credentials? Hint: they don’t reuse passwords.

    By Matt Kapko • May 4, 2023
  • Cybersecurity priorities 2020 Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive
    Image attribution tooltip
    Trendline

    Cybersecurity

    Security strategies benefit from nimbleness as companies respond to Log4j and other high-profile vulnerabilities, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort toward secure by design is seen as a potential game changer for software security, but may require investments and cultural changes.

    By David Jones • April 17, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/CIO Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    There’s a movement afoot to make tech vendors responsible for cybersecurity

    The international joint guide to secure by design encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design.

    By Matt Kapko • April 13, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an IAM system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By Matt Kapko • April 12, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks in the enterprise, creating business risk

    When an organization has little data visibility, it becomes even more vulnerable to leaks and breaches — as well as insider and external threats. 

    By Sue Poremba • April 11, 2023
  • A Samsung flag flies outside the Samsung office on August 25, 2017 in Seoul, South Korea.
    Image attribution tooltip
    Chung Sung-Jun via Getty Images
    Image attribution tooltip

    Samsung employees leaked corporate data in ChatGPT: report

    Data privacy is a concern for companies with employees using ChatGPT’s web-based interface, as input data is used to train and improve the tool.

    By April 7, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By David Jones • April 6, 2023
  • Side view of group of students coding on laptops in a computer lab
    Image attribution tooltip
    izusek via Getty Images
    Image attribution tooltip

    Upskilling, reskilling central to competing for tech talent, survey finds

    Leading organizations were more likely than their peers to put in place upskilling or reskilling initiatives, a report from NTT DATA found.

    By April 4, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines OpenAI's generative AI capabilities with Microsoft's threat intelligence and security network.

    By David Jones • March 28, 2023
  • A sign is posted in front of the Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California. Silicon Valley Bank was shut down on Friday morning by California regulators and w
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    Tech vendor risk raises vetting stakes in wake of SVB crisis

    Deposits are safe, but tech startups may no longer have access to venture debt and the lines of credit that helped fuel innovation.

    By March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 tips to counter identity and access management risks

    Many organizations rely on identity and access management tools for credential management and authentication. But these systems aren’t foolproof.

    By Matt Kapko • March 24, 2023
  • In this photo illustration, the home page for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    ChatGPT bug underlines need to limit shadow IT

    If you share information with the tool, you do so at your own risk, according to experts.

    By March 23, 2023
  • Federal Trade Commission Chair Lina Khan listens as U.S. President Joe Biden delivers remarks on the economy in the Eisenhower Executive Office Building on October 26, 2022 in Washington, DC.
    Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    FTC opens inquiry into cloud market competition, security

    As consolidation among hyperscalers grows, federal authorities are raising concerns over cloud dependence in critical sectors.

    By March 22, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By Matt Kapko • March 22, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. announced plans to shift liability for weak product security onto the tech industry.

    By David Jones • March 21, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Workforce reductions hinder tech upskilling: report

    As layoffs and hiring freezes reach tech companies, funding and scheduling training becomes a problem, a Pluralsight report found.

    By March 20, 2023
  • Silhouette of teams playing tug of war
    Image attribution tooltip
    Chris Gorgio via Getty Images
    Image attribution tooltip

    Cybersecurity market confronts potential consequences of banking crisis

    Bank seizures impose new challenges on vendors in every segment — and may spur consolidation.

    By Matt Kapko • March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    Threat hunters and security executives warned organizations to look out for malicious activity as regulators step in to operate Silicon Valley Bank.

    By Matt Kapko • March 15, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By Matt Kapko • March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Hispanolistic via Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By Matt Kapko • March 6, 2023
  • Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies.
    Image attribution tooltip
    Permission granted by Office of the National Cyber Director
    Image attribution tooltip

    The US cyber strategy is out. Now, officials just have to implement it

    Industry stakeholders signal a willingness to discuss further steps, while congressional leaders hint additional action may be on the table.

    By David Jones • March 3, 2023
  • burnout at work
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Stressed much? It’s chronic in cybersecurity

    The psychological toll of security will spur high levels of churn among security leaders, Gartner expects.

    By Feb. 28, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Matt Kapko • Feb. 21, 2023
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT, too. Here’s what businesses should watch

    While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.

    By Feb. 21, 2023