Security: Page 3


  • Exterior shot of a corporate campus,
    Image attribution tooltip
    Scott Olson/Getty Images via Getty Images
    Image attribution tooltip

    How P&G rolled out its internal generative AI model

    Built on OpenAI's API, the solution supports over 35 use cases, CIO Vittorio Cretella said.

    By Oct. 18, 2023
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Tvphc
    Image attribution tooltip

    Where to invest to close the cybersecurity skills gap

    Executives in search of top cybersecurity talent should refine their recruitment processes and company culture.

    By Oct. 9, 2023
  • Finance business investment data analytics strategy report, crypto currency blockchain stock exchange graph chart and business man in suit typing on keyboard computer, financial and technology.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    What to consider when choosing cybersecurity providers

    While it might be easier for an organization to build its core cybersecurity system from a single company, that may not always be the right option.

    By Sue Poremba • Oct. 6, 2023
  • An open atrium filled with plants with stars crossing open floors.
    Image attribution tooltip
    Naomi Eide/Tvphc
    Image attribution tooltip

    AWS kicks off cloud race to mandate MFA by default

    The cloud giant will start requiring users with the highest level of privileges to use MFA starting in mid-2024.

    By Matt Kapko • Oct. 4, 2023
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Cyber investments on pace to reach $215B in 2024: Gartner

    The firm expects security services, the industry’s largest segment, to account for 42% of all spending and rise 11% to $90 billion next year.

    By Matt Kapko • Oct. 4, 2023
  • Cyber internet security and privacy concept. Database storage 3d illustration.
    Image attribution tooltip
    JuSun via Getty Images
    Image attribution tooltip

    Threats in cloud top list of executive cyber concerns, PwC finds

    Lack of tech talent is a contributing factor, as more than 2 in 5 executives grapple with in-house skills gaps.

    By Oct. 3, 2023
  • A man with many cables works in the server room of the data center.
    Image attribution tooltip
    klmax via Getty Images
    Image attribution tooltip

    Cloud sprawl frustrates enterprise connectivity

    Companies are losing control of IT and security amid a tangle of apps and SaaS tools, according to a Forrester report commissioned by Cloudflare.

    By Sept. 26, 2023
  • FBI Director Chris Wray addresses the 2023 mWISE Conference from Mandiant.
    Image attribution tooltip
    Courtesy of Mandiant
    Image attribution tooltip

    FBI director urges private sector to work with the agency on cyber threats

    Christopher Wray told attendees at Mandiant’s mWISE 2023 private sector assistance contributed to the success of several recent operations.

    By David Jones • Sept. 25, 2023
  • Cisco SVP and CIO Fletcher Previn speaking to an audience at the Jamf Nation User Conference on Sept. 20, 2023.
    Image attribution tooltip
    Permission granted by OLIVER COWLEY MERRITTGROUP
    Image attribution tooltip

    What Cisco learned about Mac vs. PC in the enterprise

    A year-long internal trial revealed MacBooks were less vulnerable to cyber threats than PCs, and less expensive over time, according to SVP and CIO Fletcher Previn.

    By Sept. 21, 2023
  • Agronomist woman using digital tablet in wheat field.
    Image attribution tooltip
    Drs Producoes via Getty Images
    Image attribution tooltip

    Cloud attainable for SMBs as costs come down

    AWS sees opportunities for business growth in tech-hungry small and midsize businesses.

    By Sept. 20, 2023
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    Compromised credential use jumps 300% in cloud intrusions: IBM

    Valid credentials are also a hot commodity in the cybercrime marketplace, accounting for the vast majority of assets for sale on the dark web, IBM found.

    By Matt Kapko • Sept. 15, 2023
  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SEC disclosure rules: What’s the role of the CIO?

    The new rules for reporting cybersecurity incidents highlight the CIO's role as a communicator and connector.

    By Sept. 13, 2023
  • Acting National Cyber Director Kemba Walden speaks during the Billington Cybersecurity Summit on Sept. 5, 2023 in Washington, D.C.
    Image attribution tooltip
    Permission granted by ZeroFox
    Image attribution tooltip

    Cybersecurity investments boost profitability, resilience: White House

    Resilience spending will help companies avoid downtime, acting National Cyber Director Kemba Walden said at the Billington Cybersecurity Summit.

    By David Jones • Sept. 7, 2023
  • The New York Stock Exchange building.
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules are taking effect: Here’s what to expect

    With enforcement on the horizon, much of the SEC's rules for material disclosures are subject to interpretation.

    By Sept. 1, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Software industry urged to assume risk on open source security

    The Open Source Security Foundation called on commercial and non-commercial organizations that use open source software components to adopt better security practices.

    By David Jones • Sept. 1, 2023
  • Person pushing large stone uphill
    Image attribution tooltip
    Nastco via Getty Images
    Image attribution tooltip

    Security basics aren’t so basic — they’re hard

    Lax security controls cause heavy damages, and security experts warn unmet basic requirements lead, time and again, to data breaches.

    By Matt Kapko • Aug. 21, 2023
  • A fashionable Hispanic woman works in her small retail clothing store, selling new fashion items. She cashes out a customer.
    Image attribution tooltip
    RyanJLane via Getty Images
    Image attribution tooltip
    Sponsored by Shopify

    Hidden revenue: Checkout is the key to conversion in retail

    Learn how important the customer checkout experience is in e-commerce.

    Aug. 21, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, according to AWS’ Mark Ryland.

    By Matt Kapko • Aug. 18, 2023
  • An employee speaks during a meeting on a SaaS video conferencing solution.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Zoom’s AI terms overhaul set the stage for broader data use scrutiny

    The shift to adopt generative AI has created tension between SaaS vendors' data desires and enterprises' security concerns.

    By Aug. 16, 2023
  • A sunlit New York Stock Exchanges is seen with 6 columns and 3 American flags with people walking by in shadow.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    SEC cyber rules ignite tension between reputation and security risk

    The rules, which take effect Sept. 5, encountered mixed reactions. Some champion board-level accountability. Others say the rules are too big of a lift.

    By David Jones • Aug. 16, 2023
  • Dark servers data center room with computers and storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Microsoft, cloud security under the microscope with federal cyber review

    The federal Cyber Safety Review Board will examine issues related to the state-linked hack of Microsoft Exchange and larger concerns tied to identity management and authentication.

    By David Jones • Aug. 14, 2023
  • A group of people standing around a display of video screens
    Image attribution tooltip

    Maxim Hopman/unsplash.com

    Image attribution tooltip
    Sponsored by Elastic

    How to create seamless customer journeys with generative AI

    Explore the transformative power of generative artificial intelligence (GAI) in enhancing customer experiences, leveraging big data and fostering brand loyalty.

    By Rick Laner, Chief Customer Officer, Elastic • Aug. 14, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Matt Kapko • Aug. 10, 2023
  • U.S. President Joe Biden waves toward visitors watching the departure as he walks to Marine One on the South Lawn of the White House July 28, 2023 in Washington, DC.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House launches AI cyber competition to fix software vulnerabilities

    In partnership with OpenAI, Anthropic, Google and Microsoft, participants will have access to top AI companies’ technology for designing new cybersecurity solutions.

    By Aug. 9, 2023
  • A sign is posted on the exterior of Zoom headquarters on February 07, 2023 in San Jose, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Zoom emphasizes customer consent as critics question AI service terms

    Concerns stem from what Zoom says it will do with customer and service-generated data and what its policy language allows.

    By Updated Aug. 11, 2023