Articles by Dice Staff
-
Ransomware: Why These Attacks Continue to Cause Cyber Risk
Since taking office in January, the Biden administration has made cybersecurity one of its top priorities, with a specific focus on countering ransomware attacks that have targeted government age… -
Federal Breach Notification Bills: Cybersecurity Pros Should Pay Attention
For the past decade, U.S. lawmakers from both parties have introduced, debated and ultimately failed to pass a federal breach notification law that would require private businesses and government… -
How Third-Party Code Makes App Development A Cybersecurity Risk
For years, cybersecurity-minded organizations have attempted to convince their development teams to bring more security into the application development process. This includes creating modern dis… -
Zero Trust: What IT and Security Pros Need to Know Now
Nearly six months after President Joe Biden signed a far-reaching executive order designed to revamp how the U.S. government approaches cybersecurity and crafts defenses against attacks, some asp… -
Why the White House Is Emphasizing Cybersecurity Jobs Now
Since Joe Biden took office in January, the White House has made cybersecurity one of its main policy concerns, and with good reason. Just before taking office, a large-scale supply chain attack… -
Hybrid Work Is Here to Stay: What IT and Security Pros Should Know
A few short months ago, it appeared that most employees would return to offices (and an approximation of a pre-pandemic existence) by Fall 2021. Then the Delta variant of COVID-19 appeared, infec… -
U.S. Government Hiring More Cybersecurity Pros: What You Should Know
If you’re eager for a cybersecurity career, the U.S. government wants you to know it’s hiring. Over the last month, the leadership of both the U.S. Department of Homeland Security and the Cyberse… -
IoT Devices and Hybrid Work: What IT and Security Pros Need to Know
While the Delta variant of COVID-19 has upended some companies’ plans for a swift return to work this fall, there’s another danger looming for those coming back to the office: Millions of long-fo… -
4 ‘Exotic’ Programming Languages Popular With Malware Developers
When it comes to cybercrime, even malware developers need to brush up on certain programming languages to stay current. Increasingly, malware authors are turning to four “exotic” programming lang… -
China and Cybersecurity: What IT and Security Pros Need to Know
Now it’s time for China’s turn in the cybersecurity spotlight. After focusing almost exclusively on Russia for the first seven months of his presidency, Joe Biden’s White House shifted part of it…