Security: Page 41


  • Microsoft, Facebook to the rescue: Big tech helps US deter North Korea cyberattacks

    Microsoft patched existing attacks and "spared many U.S. targets" while Facebook shut down accounts tied to ongoing cyberattacks, said Tom Bossert, homeland security advisor.

    By Dec. 20, 2017
  • Image attribution tooltip
    Lowe's
    Image attribution tooltip

    Lowe's builds out digital capabilities with first CDO

    As Lowe's prepares for another year of "digital evolution," will its efforts in cybersecurity, augmented and virtual reality and mobile tech be enough to outpace Home Depot?

    By Dec. 20, 2017
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Rule with a digital fist: Tech cracks down for accountability, social responsibility

    Recent scrutiny, especially in terms of national security and privacy, have upped the ante for internet companies, which are cracking down again on "fake news," malicious actors and hateful content.

    By Dec. 20, 2017
  • 'Starwars,' 'trustno1' and 'whatever' among the worst passwords of 2017

    It is easy to use one password for most sites, but it is encouraged to make a new one for each login with at least 12 characters.

    By Samantha Schwartz • Dec. 20, 2017
  • Sponsored by Dropbox

    Working with your suppliers towards GDPR compliance

    As an evolution of current data protection legal framework, organizations should prioritize suppliers as an important partner on the road to GDPR compliance.

    Dec. 20, 2017
  • Firms ready for ransomware attacks with bitcoin arsenals

    Many organizations have been hesitant to publicly admit it, however, because doing so can be an indication they are willing to pay criminal hackers.

    By Dec. 19, 2017
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip

    Compliance may cost companies millions, but non-compliance costs even more

    Compliance standards for GDPR, individual U.S. state laws and PCI DSS regulations are the most difficult for companies to reach.

    By Dec. 19, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US national security strategy puts cyberspace defense alongside land, air, maritime concerns

    The changing attitude toward technology does not just stem from calls for efficiency. Instead, the U.S. government is prioritizing modernization as a way to improve its cybersecurity and boost national defense.

    By Naomi Eide • Dec. 19, 2017
  • Sponsored by Dropbox

    The GDPR: An opportunity to rethink your approach to data security

    For many companies the new regulation requires a shift in mindset and a heightened focus on protecting user data. 

    Dec. 18, 2017
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip

    Cyberpocalypse? Cybercrimes to cost $6 trillion annually by 2021

    The fastest growing criminal acts are cybercrimes and spending on security measures is expected to rise from 2017's $86.4 billion to $93 billion in 2018.

    By Dec. 14, 2017
  • Sponsored by Dropbox

    Understanding your data

    The first step in achieving compliance is understanding what security measures your organization has in place for breach scenarios. 

    Dec. 14, 2017
  • Cryptocurrency suits up for enterprise use with backup-key armed BitGo

    A "virtual wallet provider" startup, BitGo, raised $42.5 million in venture capital funding to accommodate an exponential growth of corporate customers.

    By Samantha Schwartz • Dec. 12, 2017
  • Image attribution tooltip
    Depositphotos_40325215_originalamazon
    Image attribution tooltip

    AWS announces single sign-on, but is it worth it?

    If a bad actor were to obtain a single password that can access multiple applications, the damages could prove catastrophic.

    By Samantha Schwartz • Dec. 11, 2017
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    You can't hide cryptocurrency under your mattress: Hackers steal $70M in bitcoin

    Many investments are inherently risky, but just like other forms of investment, bitcoin is not without its own unique risks. 

    By Samantha Schwartz • Dec. 8, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Who will save cybersecurity? Women and millennials

    The most prominent reason for the shortage is too few candidates have the proper skills, but by pursuing more women and younger candidates, companies are expected to fill the gap.

    By Samantha Schwartz • Dec. 8, 2017
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    100K routers are ready, willing and able with new Mirai strain

    The current strain and Reaper, unlike other variants, do not use default passwords and instead propagate "by exploiting remote code-execution vulnerabilities."

    By Samantha Schwartz • Dec. 6, 2017
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip
    Dive Awards

    Disruption of the Year: Global cyberattacks

    Cyberattacks have moved beyond targeting web-facing and revenue-generating systems. Because of that, corporate earnings for companies across sectors are taking a hit. 

    By Naomi Eide • Dec. 4, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    50/50: Internet connection still has half a planet to reach

    Companies are expected to invest about $6 trillion in IoT solutions from 2015-2020, but unless network and security infrastructure are upgraded the IoT may be in trouble.

    By Samantha Schwartz • Dec. 4, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Apple 'roots' through software process following security glitch

    The company's latest OS releases have had a rocky few weeks with an autocorrect software bug and, most recently, a glaring security vulnerability. 

    By Dec. 1, 2017
  • Deep Dive

    From global cyberthreats to the security echo chamber: 4 questions with Xerox's CISO

    For "CISOs, it's our responsibility to make sure we're having the right conversation at the right level, because we can geek out," said Dr. Alissa Johnson.

    By Naomi Eide • Dec. 1, 2017
  • Companies need a 'see something, say something' policy for phishing schemes

    If an entire infrastructure is taken down by a phishing scheme, there are significant security weaknesses that need addressing. 

    By Samantha Schwartz • Nov. 30, 2017
  • Image attribution tooltip
    Elizabeth Regan/CIO Dive
    Image attribution tooltip
    Deep Dive

    What happens after one of the largest government data breaches in US history?

    More than two years after OPM was hacked — twice — ripple effects are still felt across U.S. agencies and the third parties they associate with.

    By Samantha Schwartz • Nov. 30, 2017
  • Image attribution tooltip
    Kendall Davis
    Image attribution tooltip
    Deep Dive

    6 months to GDPR: What's next?

    With May 2018 looming on the horizon, the vast majority of companies still have a long journey ahead of them in becoming compliant to the new data privacy regulations. A costly, confusing and long process is ahead for many.

    By Nov. 28, 2017
  • Opinion

    6 steps IT should take right now to prepare for GDPR

    Between the hefty fines, the weight and reach of the legislation, and the upcoming deadline, it's no wonder that IT teams are feeling the GDPR pressure. But addressing the sweeping regulation can be daunting. 

    By Arlo Gilbert • Nov. 28, 2017
  • Symantec taps AWS to power workloads

    The security company has a "data lake" on AWS, which gathers troves of data daily from 175 million endpoints as part of its "cloud-first" project.

    By Samantha Schwartz • Nov. 27, 2017