Security: Page 53


  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Why Adobe is rolling out digital signatures for any device

    Instead of waiting until they return to the office to print and sign a document, users can now review, sign and send documents securely via any mobile device.

    By Feb. 23, 2017
  • Elite federal tech team in hot water over shadow IT

    The General Services Administration’s internal watchdog found 18F, an organization established by the Obama administration, created its own security assessment and authorization process. 

    By Feb. 23, 2017
  • Deep Dive

    Who really owns security in the enterprise?

    As an increase in large-scale breaches and embarrassing cybersecurity shortcomings have illustrated security's bottom-line impact, different parties have become invested, from the general council to the CEO. 

    By Naomi Eide • Feb. 23, 2017
  • Netflix 'Stethoscope' finds the beat of employees' security habits

    The streaming giant believes a user-focused approach to improving security can enable better results, so now it's open-sourcing its internal tool.

    By Feb. 22, 2017
  • DHS wants to stop the rise of large-scale DDoS attacks

    The use of botnets to launch DDoS attacks made such attacks bigger and more lethal, so much so that DHS is dedicating time and money to address the issue.

    By Feb. 21, 2017
  • Deep Dive

    7 experts share their personal cybersecurity habits

    Speaking at RSA 2017 in San Francisco, experts outlined their personal cybersecurity habits, from using password managers to paying attention to the merging of physical and digital security. 

    By Naomi Eide • Feb. 21, 2017
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip
    Deep Dive

    Technobabble: The 5 best booths at RSA 2017

    It's not always about the flashiness of a booth that can gain a viewer's attention. Rather, cleverness can go a long way and so can promising "swag."

    By Naomi Eide • Feb. 17, 2017
  • Tech groups want lawmakers to add privacy protections to FISA

    Section 702 gives the National Security Agency authority to view communications, including internet traffic, of people living outside the U.S.  

    By Feb. 17, 2017
  • Verizon, Yahoo could discount deal by $300M

    The deal could be announced this week, though it may not close until the summer.

    By Feb. 15, 2017
  • Image attribution tooltip
    RSA Live Strream
    Image attribution tooltip

    RSA 2017: Nation state cybercrime has created the need for a 'digital Geneva convention'

    Speaking Tuesday at RSA in San Francisco, Brad Smith, the president and chief legal officer of Microsoft, called on countries to form an international agreement to better protect the private sector from nation state cyberthreats.

    By Naomi Eide • Feb. 15, 2017
  • Hackers infiltrated 5,000 devices on a college campus

    The nightmarish situation is used as a case study for network security across academe.

    By Jarrett Carter • Feb. 14, 2017
  • Opinion

    Businesses need to prepare as ransomware emerges as one of the most dangerous cyberthreats

    The blackmail threat is faceless, with plenty of modern day raiders hacking into computers and accounts and then demanding money to return the victim's data. 

    By Mark Crosbie • Feb. 14, 2017
  • Why your next hire could be a hacker

    To stop a hacker, you need to think like a hacker.

    By Feb. 14, 2017
  • Hackers beware, IBM puts Watson AI on cybersecurity case

    Big Blue says 50 of its customers have tested the new software.

    By Feb. 14, 2017
  • Deep Dive

    Privacy Shield: Where are we now?

    What's changed? It has been a year since E.U. and U.S. officials agreed to form a new pact for data exchange, and seven months since that pact was officially adopted. 

    By Feb. 13, 2017
  • Deep Dive

    Cybersecurity — What CIOs need to know

    As it turns out, organizations are still trying to construct larger "castle walls," failing to realize that aggressors' methods are far more advanced and lack rule-based limitations.

    By Naomi Eide • Feb. 13, 2017
  • Senators push Yahoo CEO for answers

    Senators say so far the company has been unable to provide answers to many basic questions. Yahoo has yet to respond.

    By Feb. 13, 2017
  • Snap signs up for AWS cloud too, just in case

    In the name of redundancy, the social media company has signed on for its second enormous investment in cloud services. 

    By Feb. 10, 2017
  • With bug bounties going mainstream, HackerOne gets $40M funding boost

    The bug bounty company says its hacker community tripled to nearly 100,000 in 2016. 

    By Feb. 9, 2017
  • 'Net neutrality,' 'botnet' make it into the dictionary

    As technology permeates all areas of life and business, tech terms naturally have become more commonplace.

    By Feb. 8, 2017
  • Businesses expected to use 3.1B IoT devices in 2017, Gartner says

    The projections around IoT seem astronomical, but is it really ready for prime time? The rise of IoT devices continue to introduce significant security concerns.

    By , Naomi Eide • Feb. 8, 2017
  • Vizio ordered to pay $2.2M for snooping on customers

    The smart TV maker collected data on 11 million consumers without their knowledge or consent. 

    By Feb. 7, 2017
  • 14K web domains dropped Dyn following massive DDoS attack

    Immediately after the October botnet attack, researchers found 8% of web domains relying on Dyn dropped the service.  

    By Feb. 7, 2017
  • Deep Dive

    7 cybersecurity trends for 2017

    It should be a busy year when it comes to cybersecurity. From IoT device security to BEC attacks, here’s what the experts expect to see in 2017.

    By Feb. 6, 2017
  • Deep Dive

    Why companies don't hack back

    Though the internet can be wrought with threats, targeting companies of any size, it's not the Wild West. If attacked, companies can't legally retaliate. 

    By Naomi Eide • Feb. 6, 2017