Security: Page 42


  • Vulnerabilities found on Intel chips dating back to 2015

    The flaw is present on its newest 8th generation Core Processor series as well as older chip models released in 2015. 

    By Samantha Schwartz • Nov. 22, 2017
  • Uber paid hackers $100K to cover up a 2016 data breach exposing more than 57M users

    The company's new CEO recently found out about the incident and initiated an investigation, notified affected drivers, and communicated the incident with the appropriate regulatory bodies.

    By Naomi Eide • Nov. 21, 2017
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Black Friday and Cyber Monday are upon us. Is your network ready?

    Though some consumers remain cautious, others will race to the stores and internet this weekend, so redundancy and cybersecurity efforts are of top concern.

    By Samantha Schwartz • Nov. 21, 2017
  • Open servers reveal 1.8B social media records collected by DOD

    The origin, nature and web addresses from the posted content accompanied the exposed information, but it is unknown "how or why" the data was collected. 

    By Samantha Schwartz • Nov. 21, 2017
  • Want to avoid phishing schemes? 'Gray Saturday' the safest shopping day this week

    Cyberattackers like weekends off, too. Despite Gray Saturday falling into the most popular holiday shopping period of the year, malicious actors are less likely to attack on weekends. 

    By Samantha Schwartz • Nov. 20, 2017
  • Deep Dive

    10 gifts ideas for the IT pro in your life

    From practical, everyday tools to futuristic fun, here's the definitive gift guide for the 2017 holiday season.

    By Nov. 17, 2017
  • Image attribution tooltip
    Elizabeth Regan/CIO Dive
    Image attribution tooltip
    Deep Dive

    17 things to be thankful for in technology

    Though some of us were not as lucky in dodging 2017's gift of cyberattacks and breaches, Thanksgiving is still a time for turkey, loved ones and Jimmy Fallon-style thank you notes. 

    By Naomi Eide , Samantha Schwartz , Nov. 17, 2017
  • 81% of breaches are a result of misused credentials

    Easily compromisable employee credentials could be the reason organizations have weak cybersecurity. How do your passwords hold up?

    By Samantha Schwartz • Nov. 17, 2017
  • Fileless attacks are plaguing endpoint security, hitting IT infrastructure

    Fileless attacks are having a breakout year — and they're approximately 10 times more successful than file-based attacks. 

    By Nov. 16, 2017
  • Net neutrality reportedly to end in December

    More than 22 million comments and complaints were filed to the FCC regarding the future of net neutrality after the agency announced plans for rule rollback earlier this year. 

    By Samantha Schwartz • Nov. 16, 2017
  • Deep Dive

    Why data center construction is 'where the action is'

    As the number of connected devices increases, the need for more infrastructure supporting them is only going to grow.

    By Kim Slowey • Nov. 16, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House increases transparency around cybersecurity flaw disclosure

    More than 90% of detected cyber vulnerabilities are reportedly disclosed by government agencies to vendors, yet knowledge that the NSA knew of a flaw exploited by the WannaCry ransomware continues to fuel critics.

    By Nov. 16, 2017
  • Half of Android devices run outdated software, creating security headache

    The most recent Android operating system currently accounts for less than 1% of the market share.

    By Nov. 15, 2017
  • To comply with GDPR, companies need to regulate employees' mobile devices

    The majority of companies allow employees to access company data from mobile devices. Out of date hardware and software, compromised networks and user error may lead to GDPR noncompliance.

    By Nov. 15, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax, reeling from breach, remains uncertain of its data encryption

    Though the data breach cost Equifax $87.5 million in Q3, the company reported a 4% year-over-year revenue increase. 

    By Naomi Eide • Nov. 13, 2017
  • Best IoT security practices take backseat to 'societal' needs, Cisco CTO says

    IoT devices are not about connectivity but rather data collection and utilization for "new opportunities and services."

    By Samantha Schwartz • Nov. 13, 2017
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip
    Deep Dive

    Why POS systems continue to compromise consumer data

    Point of Sale systems, digital treasure troves of consumer credit card data, continue to suffer from breaches at the hands of hackers. Companies need to improve baseline security practices to offset the constant risk.

    By Nov. 13, 2017
  • From passwords to PII, Google account information readily available on black market

    Around 12% of records compromised by breaches include a username or password for Gmail, and 7% of those are valid for reuse. But hackers are targeting more than just passwords these days.

    By Nov. 10, 2017
  • 'Tis the season for retail security threats

    Retailers are mindful of ways to generate more revenue during the holidays, but they need to pay just as much attention to looming security threats, according to a Cyber4Sight report. 

    By Dan O'Shea • Nov. 10, 2017
  • Deep Dive

    Experience matters: Veterans fill a cybersecurity niche

    The concentration of military installations, federal agencies and contractors has allowed for a "Cyber Corridor" to emerge in the greater Washington area. But can the industry feed the cybersecurity talent pipeline?

    By Naomi Eide • Nov. 10, 2017
  • Former Yahoo CEO still does not know how breach was 'perpetrated,' blames Russia

    The interim CEO of Equifax, also present at the congressional hearing, discussed the company's post-breach efforts, including data security improvements.

    By Samantha Schwartz • Nov. 9, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Only one-third of current blockchain POCs hold promise for the enterprise

    Blockchain remains an early-stage tech that companies are throwing money at without fully grasping what the true applications are. 

    By Samantha Schwartz • Nov. 9, 2017
  • Image attribution tooltip
    Elizabeth Regan
    Image attribution tooltip
    Deep Dive

    Technology disTrumption: How 45 has impacted the tech sector

    One year after Donald Trump won the election, the technology enterprise has not significantly changed under his hands-off approach. AI may change that.

    By Nov. 8, 2017
  • Image attribution tooltip
    Pixabay
    Image attribution tooltip

    Nyetya cyberattack cost Maersk up to $300M

    The Nyetya attack severely impacted Maersk Line and Damco, the group's freight forwarding unit, due to volume and revenue loss.

    By Edwin Lopez • Nov. 8, 2017
  • Why companies are monitoring employees' computer use

    Does taking pictures of employees through their webcams at work go too far? For some companies, the answer is no. 

    By Samantha Schwartz • Nov. 7, 2017