Security: Page 44


  • Kaspersky CEO defends security products, claims innocence

    The Russian security firm claimed that the recent allegations seem to be rooted in damaging the security software provider's reputation without the opportunity of due process.

    By Samantha Schwartz • Oct. 24, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fear the Reaper: Successor to Mirai botnet emerges, no DDoS activity — yet

    The Reaper builds on some of Mirai's source code but doesn't rely on default passwords. Hackers have yet to use the botnet in a malicious way, but time will certainly tell how they plan to use it.

    By Naomi Eide • Oct. 23, 2017
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    One year after the Dyn DDoS attack broke the internet, what's changed?

    In response to the attack, security experts were quick to extol the virtues of redundancy measures — a best practice that experts have recommended for nearly two decades. But a year later, not much has changed.

    By Naomi Eide • Oct. 20, 2017
  • Facebook CSO: Social network has not 'caught up' with its security responsibilities

    With 2 billion monthly active users, the social media company carries the burden of protecting troves of personal consumer data.

    By Samantha Schwartz • Oct. 20, 2017
  • Image attribution tooltip
    Alex Hickey/CIO Dive
    Image attribution tooltip

    Azure CTO: Cloud encryption of data 'in use' coming soon

    Under coming security updates, customer data will be encrypted at rest and in use, the latter of which was not possible before and may ease fears of companies yet to migrate.

    By Oct. 19, 2017
  • The time for quantum computing investment 'is now,' experts say

    In the security sphere, a complete rollout of quantum encryption and post-quantum cryptography requires a retrospective update of old systems.

    By Oct. 18, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    The KRACK in the Wi-Fi: Vendors scramble to patch after critical flaw discovered

    Almost 150 vendors were affected by the flaw, which impacts nearly every device that can connect to the internet.  

    By Naomi Eide • Oct. 17, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    The 'winning' blockchain platform is not yet in the market, Gartner says

    Right now there are about 100 blockchain platforms being built, but none are compatible and 90% have yet to be released.

    By Naomi Eide • Oct. 16, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    Another day, another hack: Cyberattackers strike Equifax's website

    Independent assessments of a fraudulent Adobe Flash update suggests a third-party ad network Equifax used could be to blame.

    By Samantha Schwartz • Oct. 13, 2017
  • Image attribution tooltip
    Kendall Davis/CIO Dive
    Image attribution tooltip
    Deep Dive

    5 of the largest data breaches in recent history — and 4 more you forgot

    As the country mulls the impact of an increasing number of breaches, here is a look at some particularly bad incidents people might have forgotten about and companies may not have learned a lesson from.

    By Oct. 12, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Rethinking security for cloud workloads

    For the first time in the digital age, cloud software and SaaS enable the company that develops the software to also be the company that hosts the software for the consumption of its customers.

    By Manish Gupta • Oct. 12, 2017
  • Computer scientists among 2017 MacArthur 'Genius Grant' winners

    Two computer scientists earned a lifetime of bragging rights after winning the MacArthur "Genius Grant."

    By Samantha Schwartz • Oct. 12, 2017
  • Deloitte reportedly suffered hack during email migration to Office 365

    The consulting firm has implemented stricter authentication after a single-password portal was exploited, impacting up to 350 organizations, including the U.S. Department of Defense and FIFA. 

    By Samantha Schwartz • Oct. 11, 2017
  • FDIC had more than 50 data breaches in 2 years

    The OIG found problems in the department's response to several suspected breaches jeopardizing PII including social security numbers, driver's license numbers and home addresses.

    By Samantha Schwartz • Oct. 9, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    From Sears to Golden State Foods, companies turning to IoT

    Individual vendors have yet to establish dominance in the market, and IBM is trying to claim its own stake among other pushes in the cloud, blockchain and Big Data spheres.

    By Oct. 6, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US cyber espionage secrets reportedly hacked through Kaspersky software

    It is believed Russian actors accessed sensitive material through Kaspersky Labs' software on an NSA contractor's home computer, which would be the first known case of Kaspersky espionage.

    By Samantha Schwartz • Oct. 6, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    As companies struggle to discern the scope of cyberattacks, attention shifts to better detection

    Yahoo disclosed an additional two billion compromised user accounts Tuesday, highlighting just how long it took for the company to understand the full scope of the 2013 data breach. 

    By Naomi Eide • Oct. 5, 2017
  • SEC ignored warnings from forensic tech unit 2 months before breach

    It is clear the SEC's breach is no longer a matter of ignorance as concerns of "serious deficiencies" in equipment were made known in a memo to Congress.

    By Samantha Schwartz • Oct. 5, 2017
  • Deep Dive

    Mr. Smith goes to Washington: Former Equifax CEO testifies before House committee

    Committee members and Smith hashed out events surrounding the breach, which can be viewed in this feature, and raised concerns over the amount of sensitive consumer data collected and stored by large corporations. See story for timeline.

    By Oct. 4, 2017
  • DHS can't enforce Kaspersky ban on private sector, but remains vigilant

    The company's products are still widely used by U.S. consumers and the enterprise, but the DHS' decision pushed companies like Best Buy and Office Depot to remove Kaspersky products from their shelves.

    By Samantha Schwartz • Oct. 4, 2017
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Yahoo admits all 3B user accounts were hit by 2013 data breach

    The company, now a part of Verizon's Oath, emphasized that the additional impacted accounts did not stem from a new security incident.

    By Naomi Eide • Oct. 3, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip
    Opinion

    Three tips for securing hybrid IT

    By understanding the differences in security demands for cloud and on-premises environments, enterprises can be confident applications and data across a hybrid IT landscape are secure.

    By Suresh Sridharan • Oct. 3, 2017
  • Image attribution tooltip
    Getty, edited by CIO Dive
    Image attribution tooltip

    2.5M more consumers impacted by Equifax breach; investigation continues

    Equifax is being investigated by the FTC and bogged down by more than 30 lawsuits, not to mention heavily criticized by politicians and the population for its handling of the breach.

    By Oct. 3, 2017
  • Poor access control dooms federal cybersecurity, watchdog finds

    About 90% of cyber risks are a result of human error, and the Government Accountability Office's information security report highlights the matter. 

    By Samantha Schwartz • Oct. 3, 2017
  • Image attribution tooltip
    Gettty / edited by Industry Dive
    Image attribution tooltip
    Deep Dive

    On the chopping blockchain: Where does the ledger technology go from here?

    A handful of high-profile use cases exist in the financial services, but experts maintain in coming years blockchain will hit its stride in supply chains, data management and cybersecurity.

    By Oct. 2, 2017