Security: Page 5


  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an IAM system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By Matt Kapko • April 12, 2023
  • People at work in a large warehouse full of boxes.
    Image attribution tooltip
    kupicoo via Getty Images
    Image attribution tooltip

    Leftover data lurks in the enterprise, creating business risk

    When an organization has little data visibility, it becomes even more vulnerable to leaks and breaches — as well as insider and external threats.

    By Sue Poremba • April 11, 2023
  • A Samsung flag flies outside the Samsung office on August 25, 2017 in Seoul, South Korea.
    Image attribution tooltip
    Chung Sung-Jun via Getty Images
    Image attribution tooltip

    Samsung employees leaked corporate data in ChatGPT: report

    Data privacy is a concern for companies with employees using ChatGPT’s web-based interface, as input data is used to train and improve the tool.

    By April 7, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By David Jones • April 6, 2023
  • Side view of group of students coding on laptops in a computer lab
    Image attribution tooltip
    izusek via Getty Images
    Image attribution tooltip

    Upskilling, reskilling central to competing for tech talent, survey finds

    Leading organizations were more likely than their peers to put in place upskilling or reskilling initiatives, a report from NTT DATA found.

    By April 4, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines OpenAI's generative AI capabilities with Microsoft's threat intelligence and security network.

    By David Jones • March 28, 2023
  • A sign is posted in front of the Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California. Silicon Valley Bank was shut down on Friday morning by California regulators and w
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Tvphc

    Tech vendor risk raises vetting stakes in wake of SVB crisis

    Deposits are safe, but tech startups may no longer have access to venture debt and the lines of credit that helped fuel innovation.

    By March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 tips to counter identity and access management risks

    Many organizations rely on identity and access management tools for credential management and authentication. But these systems aren’t foolproof.

    By Matt Kapko • March 24, 2023
  • In this photo illustration, the home page for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    ChatGPT bug underlines need to limit shadow IT

    If you share information with the tool, you do so at your own risk, according to experts.

    By March 23, 2023
  • Federal Trade Commission Chair Lina Khan listens as U.S. President Joe Biden delivers remarks on the economy in the Eisenhower Executive Office Building on October 26, 2022 in Washington, DC.
    Image attribution tooltip
    Anna Moneymaker via Getty Images
    Image attribution tooltip

    FTC opens inquiry into cloud market competition, security

    As consolidation among hyperscalers grows, federal authorities are raising concerns over cloud dependence in critical sectors.

    By March 22, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By Matt Kapko • March 22, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. announced plans to shift liability for weak product security onto the tech industry.

    By David Jones • March 21, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Workforce reductions hinder tech upskilling: report

    As layoffs and hiring freezes reach tech companies, funding and scheduling training becomes a problem, a Pluralsight report found.

    By March 20, 2023
  • Silhouette of teams playing tug of war
    Image attribution tooltip
    Chris Gorgio via Getty Images
    Image attribution tooltip

    Cybersecurity market confronts potential consequences of banking crisis

    Bank seizures impose new challenges on vendors in every segment — and may spur consolidation.

    By Matt Kapko • March 17, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    Bank failure panic fuels moment of opportunity for threat actors

    Threat hunters and security executives warned organizations to look out for malicious activity as regulators step in to operate Silicon Valley Bank.

    By Matt Kapko • March 15, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By Matt Kapko • March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Hispanolistic via Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By Matt Kapko • March 6, 2023
  • Kemba Walden, acting national cyber director, rolls out the National Cybersecurity Strategy at a forum by the Center for Strategic and International Studies.
    Image attribution tooltip
    Permission granted by Office of the National Cyber Director
    Image attribution tooltip

    The US cyber strategy is out. Now, officials just have to implement it

    Industry stakeholders signal a willingness to discuss further steps, while congressional leaders hint additional action may be on the table.

    By David Jones • March 3, 2023
  • burnout at work
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Stressed much? It’s chronic in cybersecurity

    The psychological toll of security will spur high levels of churn among security leaders, Gartner expects.

    By Feb. 28, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Matt Kapko • Feb. 21, 2023
  • Individual types on a backlit keyboard.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT, too. Here’s what businesses should watch

    While IT departments seek enterprise applications, cyber teams must be on the lookout for attacks using the generative AI technology.

    By Feb. 21, 2023
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip

    IT security budgets triple as businesses confront more cyberattacks

    About half of all businesses suffered a breach or attack in 2022, versus 39% in 2020, according to specialty insurance provider Hiscox.

    By David Jones • Feb. 16, 2023
  • A worker types lines of code in a laptop with a dark screen.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    GitHub Copilot for Business, now in public release, weaves in security

    The AI-powered coding tool now sports a more advanced OpenAI model.

    By Feb. 14, 2023
  • Photo of 3 ChatGPT-generated questions for daters on OkCupid
    Image attribution tooltip
    Permission granted by OkCupid
    Image attribution tooltip

    OkCupid helps users find love through ChatGPT

    Love is in the air with help from AI, but experts caution against ChatGPT-powered catfishing.

    By Feb. 14, 2023
  • A frustrated young person in yellow sweater stands at table and touches their face with their hand while packing stuff up in office after dismissal
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Layoffs come for cybersecurity, too

    Even companies in more insulated fields, such as cyber vendors Sophos, Okta and Secureworks, are bound to feel the pain as enterprises cut spending.

    By Matt Kapko • Feb. 9, 2023