Security: Page 51
-
Most WannaCry victims were running Windows 7, not XP
The rate of WannaCry infections has slowed, but hackers are trying to reignite the cyberattack by using the Mirai botnet, which emerged last year.
By Justine Brown , Naomi Eide • May 22, 2017 -
Deep Dive
No second chances: Why implementing disaster recovery is critical to the enterprise
Given the current cyberthreat landscape, as well as the potential for a broad range of natural disasters, businesses must be prepared to carry on whether they are hit with random power outages, ransomware or a Category 4 hurricane.
By Justine Brown • May 22, 2017 -
Explore the Trendline➔
Getty Images
TrendlineIT Security
Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.
By CIO Dive staff -
Deep Dive
Technobabble: 5 notable voices from Interop ITX 2017
What's happening in the world of enterprise technology? At Interop ITX in Las Vegas, experts mused on where technology is headed and the personnel required to get there.
By Naomi Eide • May 19, 2017 -
Aporeto has a plan to build security directly into the cloud
By building security directly into the cloud, Aporeto hopes to reassure more companies that moving to the cloud is secure and cost effective.
By Justine Brown • May 19, 2017 -
FireEye CEO: Cybersecurity is not going the way of Blockbuster
As consumers, enterprise tech and the government converge, breaches and cyberattacks are more high stakes, creating further demand for security, Kevin Mandia said.
By Naomi Eide • May 17, 2017 -
IoT brings risks into factories, communities and homes, GAO warns
The GAO report may push forward the argument for IoT standards. Until security measures are adopted, cyberattacks via connected devices will likely persist.
By Justine Brown • May 16, 2017 -
Majority of email support for abolishing net neutrality rules reportedly spam
About 440,000 public submissions opposing the rules were found to be duplicated and used names from hacked email lists.
By Justine Brown • May 16, 2017 -
HP offers patch after security researchers uncover keylogger in laptops' audio drivers
HP said it never intended to include the keylogger feature in end-user devices.
By Justine Brown , Naomi Eide • May 15, 2017 -
'WannaCry' ransomware hits 200K computers; experts say more victims likely
Officials fear the number will grow when people return to work Monday.
By Justine Brown • May 15, 2017 -
45K 'WannaCry' ransomware attacks hit targets worldwide
Kaspersky Lab reported 74 countries were impacted by the ransomware attack, which took advantage of tools released by Shadow Brokers in April.
By Naomi Eide • May 12, 2017 -
US intelligence officials wary of Russian security firm Kaspersky Lab
Officials fear software made by Russian company Kaspersky Lab could be used to spy on Americans or attack U.S. computer networks.
By Justine Brown • May 12, 2017 -
Trump releases sweeping order on cybersecurity prioritizing IT modernization
The executive order on cybersecurity tackles much of what critics have long called for: A coordinated defense and the upgrade of back-end systems.
By Naomi Eide • May 11, 2017 -
NIST shakes up password requirements, vendors approve
The password requirements of yesterday are no longer effective in today’s threat environment, so NIST wants to get rid of old standards.
By Justine Brown • May 10, 2017 -
Snowden: Handing data over to cloud providers comes at a cost
Public clouds can leave businesses vulnerable to spying by government or other entities, NSA whistleblower Edward Snowden warns.
By Justine Brown • May 10, 2017 -
Microsoft ending support for original version of Windows 10
The company warned that continuing to use version 1507, which debuted in July 2015, could potentially put users at risk.
By Justine Brown • May 9, 2017 -
Microsoft experimenting with anti-malware browser feature for businesses
The feature, dubbed Windows Defender Application Guard, is part of the Windows Insider Previews, but a company must be a part of Microsoft’s business service to try it.
By Justine Brown • May 8, 2017 -
FBI: Losses exposed by business phishing scams increased 2,370% in 2 years
Business email compromise phishing scams have been reported in all 50 states and in 131 countries.
By Justine Brown • May 8, 2017 -
1 in 4 banks struggle to verify customers' identity online
Lack of proper verification only contributes to banks' growing concerns over financial losses from fraud.
By Justine Brown • May 5, 2017 -
IBM sent USBs that may have 'malicious code' to customers
Big Blue sent out a flash alert after the company identified a "malicious code" distributed on USB flash drives it sent customers as part of an initialization tool.
By Justine Brown • May 4, 2017 -
Deep Dive
Advising 'Mr. Robot': How a technical approach allows fiction to meet reality
For Ryan Kazanciyan, chief security architect at Tanium and technical advisor to "Mr. Robot," the challenge of the show is crafting cyberattacks that are technical enough to please industry insiders without alienating non-technical fans.
By Naomi Eide • May 4, 2017 -
Intel reveals firmware flaw in Core processors as far back as 2008
The company is not aware of any exploitation of the vulnerability to date and plans to release a prepared patch soon.
By Justine Brown • May 3, 2017 -
Microsoft took 6 months to patch flaw, but hackers took just days to monetize it
A flaw in Microsoft Word was first discovered by a consultant at a security firm and reported to Microsoft last October. Microsoft rolled out a fix on April 11.
By Justine Brown • April 28, 2017 -
Deep Dive
Technobabble: The case of the stolen identity
A colleague's stance was that he was not at risk, because he didn't matter to cybercriminals. Others could be victimized, but not him. And then just over 24 hours later ...
By Naomi Eide • April 28, 2017 -
Adoption of 'Security as a Service' growing among mid-tier companies
As cybercriminals grow more savvy and more brazen, Security as a Service can reduce costs and allow companies to focus on their primary objectives.
By Justine Brown • April 27, 2017 -
Opinion
SOC challenge: Balancing the trade-offs between cost and risk
For a SOC, mitigating risks must always include an analysis of the associated costs. How do you find the right balance?
By Slavik Markovich • April 27, 2017