Security: Page 54


  • Image attribution tooltip
    Deposit Photor
    Image attribution tooltip

    HackerOne sets hackers on open source projects to improve internet security

    The company says it wants to improve the safety of open source projects that underlie so many internet products and services today.

    By March 6, 2017
  • Yahoo fallout: General counsel resigns, CEO won't see bonus

    General Counsel Ronald Bell resigned after an SEC report found Yahoo’s legal team had enough information in 2014 to warrant further investigation.

    By March 3, 2017
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • Soon, users will actually be able to schedule their Windows 10 updates

    Microsoft personnel promise new features in the Windows 10 Creators Update will put users in better control of their privacy and security.

    By March 2, 2017
  • How one Boeing employee exposed the personal data of 36K coworkers

    A simple email request for help formatting an Excel spreadsheet could have been a security disaster.

    By March 2, 2017
  • Microsoft, Intel lead collaboration to adapt blockchain for business

    The new alliance will work to make Ethereum blockchain better suited to enterprise applications.

    By March 1, 2017
  • A test case for other states, NY cybersecurity regulations take effect

    On Wednesday, New York became the first state to require companies to implement cybersecurity programs to protect customers.  

    By March 1, 2017
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Google turns email encryption effort over to GitHub

    As part of a community-driven open source end-to-end encryption research effort, Google is hoping developers can help make E2E more user-friendly

    By Feb. 28, 2017
  • Microsoft adds option to prevent Windows 10 installation of 'bloatware'

    Windows 10 users will soon be able to restrict the installation of software from any source other than the Windows Store.

    By Feb. 28, 2017
  • Cloudflare admits bug leaked customer data for months

    About one in every 3.3 million HTTP requests to Cloudflare sites may have exposed data with the "Cloudbleed" leak.

    By Feb. 27, 2017
  • Deep Dive

    Why third-party risk is worth the reward

    With the transition to service providers and cloud offerings, security concerns began to fall outside the purview of the enterprise and instead to workloads and relationship processes.

    By Naomi Eide • Feb. 27, 2017
  • Cybercriminals offer 'customer support' to help victims pay ransomware

    Transcripts of "customer support" chat reveal how creative criminals can be in order to get paid.

    By Feb. 24, 2017
  • Image attribution tooltip
    Fotolia
    Image attribution tooltip

    Why Adobe is rolling out digital signatures for any device

    Instead of waiting until they return to the office to print and sign a document, users can now review, sign and send documents securely via any mobile device.

    By Feb. 23, 2017
  • Elite federal tech team in hot water over shadow IT

    The General Services Administration’s internal watchdog found 18F, an organization established by the Obama administration, created its own security assessment and authorization process. 

    By Feb. 23, 2017
  • Deep Dive

    Who really owns security in the enterprise?

    As an increase in large-scale breaches and embarrassing cybersecurity shortcomings have illustrated security's bottom-line impact, different parties have become invested, from the general council to the CEO. 

    By Naomi Eide • Feb. 23, 2017
  • Netflix 'Stethoscope' finds the beat of employees' security habits

    The streaming giant believes a user-focused approach to improving security can enable better results, so now it's open-sourcing its internal tool.

    By Feb. 22, 2017
  • DHS wants to stop the rise of large-scale DDoS attacks

    The use of botnets to launch DDoS attacks made such attacks bigger and more lethal, so much so that DHS is dedicating time and money to address the issue.

    By Feb. 21, 2017
  • Deep Dive

    7 experts share their personal cybersecurity habits

    Speaking at RSA 2017 in San Francisco, experts outlined their personal cybersecurity habits, from using password managers to paying attention to the merging of physical and digital security. 

    By Naomi Eide • Feb. 21, 2017
  • Image attribution tooltip
    Naomi Eide/CIO Dive
    Image attribution tooltip
    Deep Dive

    Technobabble: The 5 best booths at RSA 2017

    It's not always about the flashiness of a booth that can gain a viewer's attention. Rather, cleverness can go a long way and so can promising "swag."

    By Naomi Eide • Feb. 17, 2017
  • Tech groups want lawmakers to add privacy protections to FISA

    Section 702 gives the National Security Agency authority to view communications, including internet traffic, of people living outside the U.S.  

    By Feb. 17, 2017
  • Verizon, Yahoo could discount deal by $300M

    The deal could be announced this week, though it may not close until the summer.

    By Feb. 15, 2017
  • Image attribution tooltip
    RSA Live Strream
    Image attribution tooltip

    RSA 2017: Nation state cybercrime has created the need for a 'digital Geneva convention'

    Speaking Tuesday at RSA in San Francisco, Brad Smith, the president and chief legal officer of Microsoft, called on countries to form an international agreement to better protect the private sector from nation state cyberthreats.

    By Naomi Eide • Feb. 15, 2017
  • Hackers infiltrated 5,000 devices on a college campus

    The nightmarish situation is used as a case study for network security across academe.

    By Jarrett Carter • Feb. 14, 2017
  • Opinion

    Businesses need to prepare as ransomware emerges as one of the most dangerous cyberthreats

    The blackmail threat is faceless, with plenty of modern day raiders hacking into computers and accounts and then demanding money to return the victim's data. 

    By Mark Crosbie • Feb. 14, 2017
  • Why your next hire could be a hacker

    To stop a hacker, you need to think like a hacker.

    By Feb. 14, 2017
  • Hackers beware, IBM puts Watson AI on cybersecurity case

    Big Blue says 50 of its customers have tested the new software.

    By Feb. 14, 2017