Security: Page 43


  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    As companies struggle to discern the scope of cyberattacks, attention shifts to better detection

    Yahoo disclosed an additional two billion compromised user accounts Tuesday, highlighting just how long it took for the company to understand the full scope of the 2013 data breach. 

    By Naomi Eide • Oct. 5, 2017
  • SEC ignored warnings from forensic tech unit 2 months before breach

    It is clear the SEC's breach is no longer a matter of ignorance as concerns of "serious deficiencies" in equipment were made known in a memo to Congress.

    By Samantha Schwartz • Oct. 5, 2017
  • Deep Dive

    Mr. Smith goes to Washington: Former Equifax CEO testifies before House committee

    Committee members and Smith hashed out events surrounding the breach, which can be viewed in this feature, and raised concerns over the amount of sensitive consumer data collected and stored by large corporations. See story for timeline.

    By Oct. 4, 2017
  • DHS can't enforce Kaspersky ban on private sector, but remains vigilant

    The company's products are still widely used by U.S. consumers and the enterprise, but the DHS' decision pushed companies like Best Buy and Office Depot to remove Kaspersky products from their shelves.

    By Samantha Schwartz • Oct. 4, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yahoo admits all 3B user accounts were hit by 2013 data breach

    The company, now a part of Verizon's Oath, emphasized that the additional impacted accounts did not stem from a new security incident.

    By Naomi Eide • Oct. 3, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Three tips for securing hybrid IT

    By understanding the differences in security demands for cloud and on-premises environments, enterprises can be confident applications and data across a hybrid IT landscape are secure.

    By Suresh Sridharan • Oct. 3, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    2.5M more consumers impacted by Equifax breach; investigation continues

    Equifax is being investigated by the FTC and bogged down by more than 30 lawsuits, not to mention heavily criticized by politicians and the population for its handling of the breach.

    By Oct. 3, 2017
  • Poor access control dooms federal cybersecurity, watchdog finds

    About 90% of cyber risks are a result of human error, and the Government Accountability Office's information security report highlights the matter. 

    By Samantha Schwartz • Oct. 3, 2017
  • Image attribution tooltip
    Gettty / edited by Industry Dive
    Image attribution tooltip
    Deep Dive

    On the chopping blockchain: Where does the ledger technology go from here?

    A handful of high-profile use cases exist in the financial services, but experts maintain in coming years blockchain will hit its stride in supply chains, data management and cybersecurity.

    By Oct. 2, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime costs US companies $21.2M per year, study finds

    Savvy hackers are taking advantage of an understaffed security workforce and using trusted applications as an entry point into company networks. 

    By Samantha Schwartz • Sept. 29, 2017
  • NERC proposal targets cybersecurity risks in electric system supply chains

    The new standards aim to reduce the likelihood that an attacker could exploit legitimate vendor patch management processes to deliver compromised software updates to the U.S. bulk electric system.

    By Robert Walton • Sept. 28, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip
    Deep Dive

    Equifax breach: What you need to know

    Since the breach was first disclosed at the beginning of September, Equifax has undergone a slew of changes, highlighting how large-scale security incidents can impact an organization's bottom line. 

    By Naomi Eide • Sept. 27, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Smart watches, lighting, cities … is the IoT the newest weapon of the cybercriminal?

    Twenty years ago, IT networks were easy to map — once some PCs and a printer were linked to the server, most workspaces were ready to go. It's no longer that simple. 

    By Scott Millis • Sept. 27, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How execs can quantify the ROI of cybersecurity: a model

    Think of cybersecurity like you would a supply chain — each link is important, but a cyberattack on certain partners may require a more in-depth continuity plan than others.

    By Edwin Lopez • Sept. 27, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax CEO Richard Smith retires

    The board announced CEO Richard Smith is retiring, effective Tuesday. This comes on the heels of the retirement of the company's CIO and CSO less than two weeks ago.

    By Samantha Schwartz , Sept. 26, 2017
  • Top cybersecurity consulting firm Deloitte discloses attack

    Deloitte was made aware of the hack in March, but it is believed the incident dates back to October or November 2016. 

    By Samantha Schwartz • Sept. 26, 2017
  • Microsoft unveils new cloud security features at Ignite

    The evolving sophistication of hackers is forcing companies to integrate more built-in security services and tools.

    By Samantha Schwartz • Sept. 26, 2017
  • FICO bolsters cybersecurity in wake of Equifax breach

    The credit scoring company joins other large companies, like Google and Microsoft, in upping security measures since the breach.

    By Sept. 25, 2017
  • Deep Dive

    Technobabble: Bill Gates' regret and brains becoming internet-connected

    A new IoT device is emerging. Researchers used an EEG headset to connect a human brain to the internet in real time, a breakthrough in the field of brain-machine interfaces. 

    By Samantha Schwartz , Sept. 22, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CCleaner attack targeted 'intellectual property' of top tech firms including Microsoft, Cisco

    The attack went undiscovered for four weeks and targeted leading tech firms, demonstrating a high-level of attacker sophistication. 

    By Samantha Schwartz • Sept. 22, 2017
  • SEC data breach may have led to 'illicit gain through trading'

    The intrusion was detected in 2016 and a patch was administered. However, the SEC learned in August that hackers were still able to exploit the software vulnerability in EDGAR's test filing component. 

    By Samantha Schwartz • Sept. 21, 2017
  • FedEx takes $300M hit to operating income after Nyetya

    The 3PL's operating income fell 11% compared to the same period last year, partly due to the cyberattack and Hurricane Harvey.

    By Edwin Lopez • Sept. 21, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    When public cloud security concerns persist, companies look to encryption

    Though 80% of those surveyed by Bitdefender say encryption is the most effective way to store securely in the cloud, only one in six encrypt all data stored in the public cloud.

    By Naomi Eide • Sept. 20, 2017
  • IBM edges out Microsoft, Accenture in blockchain race

    Big Blue was ranked first for its large R&D blockchain efforts and wide array of clients using the technology across industries and verticals, according to Juniper Research.

    By Sept. 19, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Equifax suffered another breach in March

    The March data breach was unrelated to the security incident discovered on July 29, the company said. 

    By Naomi Eide • Sept. 19, 2017