Security: Page 53
-
4B records compromised in 2016, IBM says
The number of records breached in 2016 grew 566% year-over-year.
By Justine Brown • March 30, 2017 -
Survey: Yesterday's security tools inadequate in new cloud environments
Three quarters of respondents say traditional security solutions either don’t work at all in the cloud or don’t work as needed.
By Justine Brown • March 29, 2017 -
Explore the Trendline➔
Getty Images
TrendlineIT Security
Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.
By CIO Dive staff -
Report: Atlanta has the most gadgets connected on home networks in the US
Connected homes are quickly becoming more common. Across major cities, on average 8.35 devices are connected to home networks.
By Justine Brown • March 27, 2017 -
Google downgrades trust in Symantec SSL certificates
The web giants plans to remove trust in old Symantec SSL certificates after an investigation revealed several security slip-ups.
By Justine Brown • March 27, 2017 -
Arranging a black market DDoS attack can cost as little as $7 per hour
The cost of launching a DDoS attack varies based on factors such as length of the attack, intended target and source, Kaspersky Lab found.
By Justine Brown • March 24, 2017 -
IDC: Individual department tech spending will nearly equal IT investment by 2020
IT will continue to purchase some types of technology, such as servers, storage, and network equipment, but business units will spend more on PCs, monitors, mobile phones, printers and tablets than IT in 2017.
By Justine Brown • March 24, 2017 -
Shutting down unused servers can save money, reduce security threats
As virtualization becomes more prevalent, more unattended or abandoned servers are cropping up on campus networks.
By Stephen Noonoo • March 23, 2017 -
FireEye CEO: US must impose stiffer penalties to dissuade foreign hackers
Kevin Mandia's comments come just after a grand jury indicted four defendants in connection with the 2014 Yahoo breach, potentially opening the door for a discussion of nation state involvement in domestic cyberattacks.
By Justine Brown • March 23, 2017 -
Why hasn't the number of women in cybersecurity increased?
Women are vastly underrepresented in cybersecurity, and not only do they report facing discrimination in the workplace, women in security also earn less than men at every level.
By Justine Brown • March 21, 2017 -
IBM Watson's latest task: Help businesses protect endpoints
Big Blue's new tool will use artificial intelligence and machine learning to analyze endpoints on a network and monitor their security.
By Justine Brown • March 21, 2017 -
Cisco issues critical warning after WikiLeaks exposes security hole
So far, WikiLeaks has not shared the technical details and code of the hacking tools with impacted companies.
By Justine Brown • March 21, 2017 -
IBM beats competitors to the punch with Blockchain as a Service
The company's blockchain technology is the first service to allow developers to build enterprise-grade technology using Hyperledger Fabric.
By Justine Brown • March 21, 2017 -
Personal data of thousands of Saks Fifth Avenue customers exposed
Owner Hudson’s Bay Co. took the affected pages offline after an inquiry from Buzzfeed News, but email, phone numbers and IP addresses were visible in the meantime.
By Daphne Howland • March 20, 2017 -
Report: Legacy systems once thought secure are susceptible to cyberthreats
Cybersecurity incidents in the U.S. federal government increased by 1,121% between 2006 and 2014.
By Justine Brown • March 20, 2017 -
Deep Dive
How a decentralized approach to IT put the DOT at risk
Former CIO Richard McKinney explains how shadow IT and daisy-chained network devices created a tech nightmare at the nation’s transportation agency.
By Justine Brown • March 20, 2017 -
Tech giants side with Google in fight over foreign emails
Apple, Microsoft, Amazon and Cisco filed a brief in support of Google to try and prevent law enforcement from retrieving customer data located outside the U.S.
By Justine Brown • March 16, 2017 -
33.7M records leaked from US commercial database
Can PII be protected or controlled anymore? Business services company Dun & Bradstreet confirmed it owned the leaked database, which it acquired from NetProspex in 2015.
By Justine Brown • March 16, 2017 -
Grand jury indicts 4 hackers for 2014 Yahoo breach
The defendants include two Russian Federal Security Service (FSB) officers who allegedly committed computer hacking, economic espionage and criminal offense.
By Naomi Eide • March 15, 2017 -
Why companies should start using HTTPS
Major websites such as Facebook, Twitter and Wikipedia now offer HTTPS by default, which works to ensure the security of content online.
By Justine Brown • March 15, 2017 -
AWS pushes Snowball Edge to the limit — by testing its resilience using underwater explosives
AWS wants customers and potential customers to know it’s ready for anything.
By Justine Brown , Naomi Eide • March 14, 2017 -
Target promotes security VP after CISO leaves to join Booz Allen
Target promoted Rich Agostino to replace Brad Maiorino as CISO.
By Justine Brown • March 10, 2017 -
Deep Dive
How 5 women in cybersecurity are approaching the industry gender gap
Though the outlook of gender diversity in cybersecurity seems grim, female leaders in the sector are working from within the industry to create a more diverse and inclusive work environment in both cyber and STEM.
By Naomi Eide • March 8, 2017 -
How a spamming organization collected, and exposed, data on 1.37B email accounts
The data was collected by a group disguising itself as a legitimate marketing firm offering free services, which failed to properly configure its backups, exposing the information.
By Justine Brown • March 7, 2017 -
Why Consumer Reports is taking on device security, privacy
The company hopes to eventually get device manufactures to meet security standards when building and designing connected devices, software and mobile apps.
By Justine Brown • March 7, 2017 -
Deep Dive
The mobile device conundrum: Employee flexibility and security at odds
Enterprise data on mobile devices can be dangerous. But as workers insist on flexible options, the mobile device management market is forced to evolve.
By Justine Brown • March 7, 2017