Security: Page 42
-
100K routers are ready, willing and able with new Mirai strain
The current strain and Reaper, unlike other variants, do not use default passwords and instead propagate "by exploiting remote code-execution vulnerabilities."
By Samantha Schwartz • Dec. 6, 2017 -
Dive Awards
Disruption of the Year: Global cyberattacks
Cyberattacks have moved beyond targeting web-facing and revenue-generating systems. Because of that, corporate earnings for companies across sectors are taking a hit.
By Naomi Eide • Dec. 4, 2017 -
Explore the Trendline➔
Getty Images
TrendlineIT Security
Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.
By CIO Dive staff -
50/50: Internet connection still has half a planet to reach
Companies are expected to invest about $6 trillion in IoT solutions from 2015-2020, but unless network and security infrastructure are upgraded the IoT may be in trouble.
By Samantha Schwartz • Dec. 4, 2017 -
Apple 'roots' through software process following security glitch
The company's latest OS releases have had a rocky few weeks with an autocorrect software bug and, most recently, a glaring security vulnerability.
By Alex Hickey • Dec. 1, 2017 -
Deep Dive
From global cyberthreats to the security echo chamber: 4 questions with Xerox's CISO
For "CISOs, it's our responsibility to make sure we're having the right conversation at the right level, because we can geek out," said Dr. Alissa Johnson.
By Naomi Eide • Dec. 1, 2017 -
Companies need a 'see something, say something' policy for phishing schemes
If an entire infrastructure is taken down by a phishing scheme, there are significant security weaknesses that need addressing.
By Samantha Schwartz • Nov. 30, 2017 -
Deep Dive
What happens after one of the largest government data breaches in US history?
More than two years after OPM was hacked — twice — ripple effects are still felt across U.S. agencies and the third parties they associate with.
By Samantha Schwartz • Nov. 30, 2017 -
Deep Dive
6 months to GDPR: What's next?
With May 2018 looming on the horizon, the vast majority of companies still have a long journey ahead of them in becoming compliant to the new data privacy regulations. A costly, confusing and long process is ahead for many.
By Alex Hickey • Nov. 28, 2017 -
Opinion
6 steps IT should take right now to prepare for GDPR
Between the hefty fines, the weight and reach of the legislation, and the upcoming deadline, it's no wonder that IT teams are feeling the GDPR pressure. But addressing the sweeping regulation can be daunting.
By Arlo Gilbert • Nov. 28, 2017 -
Symantec taps AWS to power workloads
The security company has a "data lake" on AWS, which gathers troves of data daily from 175 million endpoints as part of its "cloud-first" project.
By Samantha Schwartz • Nov. 27, 2017 -
Vulnerabilities found on Intel chips dating back to 2015
The flaw is present on its newest 8th generation Core Processor series as well as older chip models released in 2015.
By Samantha Schwartz • Nov. 22, 2017 -
Uber paid hackers $100K to cover up a 2016 data breach exposing more than 57M users
The company's new CEO recently found out about the incident and initiated an investigation, notified affected drivers, and communicated the incident with the appropriate regulatory bodies.
By Naomi Eide • Nov. 21, 2017 -
Black Friday and Cyber Monday are upon us. Is your network ready?
Though some consumers remain cautious, others will race to the stores and internet this weekend, so redundancy and cybersecurity efforts are of top concern.
By Samantha Schwartz • Nov. 21, 2017 -
Open servers reveal 1.8B social media records collected by DOD
The origin, nature and web addresses from the posted content accompanied the exposed information, but it is unknown "how or why" the data was collected.
By Samantha Schwartz • Nov. 21, 2017 -
Want to avoid phishing schemes? 'Gray Saturday' the safest shopping day this week
Cyberattackers like weekends off, too. Despite Gray Saturday falling into the most popular holiday shopping period of the year, malicious actors are less likely to attack on weekends.
By Samantha Schwartz • Nov. 20, 2017 -
Deep Dive
10 gifts ideas for the IT pro in your life
From practical, everyday tools to futuristic fun, here's the definitive gift guide for the 2017 holiday season.
By Alex Hickey • Nov. 17, 2017 -
Deep Dive
17 things to be thankful for in technology
Though some of us were not as lucky in dodging 2017's gift of cyberattacks and breaches, Thanksgiving is still a time for turkey, loved ones and Jimmy Fallon-style thank you notes.
By Naomi Eide , Samantha Schwartz , Alex Hickey • Nov. 17, 2017 -
81% of breaches are a result of misused credentials
Easily compromisable employee credentials could be the reason organizations have weak cybersecurity. How do your passwords hold up?
By Samantha Schwartz • Nov. 17, 2017 -
Fileless attacks are plaguing endpoint security, hitting IT infrastructure
Fileless attacks are having a breakout year — and they're approximately 10 times more successful than file-based attacks.
By Alex Hickey • Nov. 16, 2017 -
Net neutrality reportedly to end in December
More than 22 million comments and complaints were filed to the FCC regarding the future of net neutrality after the agency announced plans for rule rollback earlier this year.
By Samantha Schwartz • Nov. 16, 2017 -
Deep Dive
Why data center construction is 'where the action is'
As the number of connected devices increases, the need for more infrastructure supporting them is only going to grow.
By Kim Slowey • Nov. 16, 2017 -
White House increases transparency around cybersecurity flaw disclosure
More than 90% of detected cyber vulnerabilities are reportedly disclosed by government agencies to vendors, yet knowledge that the NSA knew of a flaw exploited by the WannaCry ransomware continues to fuel critics.
By Alex Hickey • Nov. 16, 2017 -
Half of Android devices run outdated software, creating security headache
The most recent Android operating system currently accounts for less than 1% of the market share.
By Alex Hickey • Nov. 15, 2017 -
To comply with GDPR, companies need to regulate employees' mobile devices
The majority of companies allow employees to access company data from mobile devices. Out of date hardware and software, compromised networks and user error may lead to GDPR noncompliance.
By Alex Hickey • Nov. 15, 2017 -
Equifax, reeling from breach, remains uncertain of its data encryption
Though the data breach cost Equifax $87.5 million in Q3, the company reported a 4% year-over-year revenue increase.
By Naomi Eide • Nov. 13, 2017