Leadership & Careers: Page 10
-
White House cyber strategy takes shape
How the $1.2 trillion infrastructure bill invests in cyber
As part of the larger cyber funding injection, the legislation sets aside $100 million, allocated over five years, for the Cyber Response and Recovery Fund.
By Samantha Schwartz • Aug. 12, 2021 -
How human instinct can interfere with cyber crisis response
In a gut reaction to a security incident, users may make the wrong move to avoid losing data.
By Samantha Schwartz • Aug. 10, 2021 -
National K-12 cybersecurity learning standards aim to strengthen pipeline
The standards arrive as the nation faces a growing number of advanced cyberattacks and a skills gap for professionals in the space.
By Roger Riddell • Aug. 9, 2021 -
CISA takes aim at information sharing woes, launches public-private super group
The Joint Cyber Defense Collaborative is Jen Easterly's first major initiative as CISA's second-ever director.
By Samantha Schwartz • Aug. 6, 2021 -
Half of security teams report to CISO, others miss out on business benefits: survey
Companies get more buy-in for risk assessments and alignment with business goals when cybersecurity reports to the CISO, an ISACA survey found.
By Samantha Schwartz • July 27, 2021 -
How 3 critical infrastructure security executives manage vulnerabilities
Assessment of risk and strategy depends on the technologies or services companies use for vulnerability alerts, according to executives during a Dragos webcast.
By Samantha Schwartz • July 26, 2021 -
Engineers need cybersecurity training, too
Companies will undergo a shift in cyber culture, eventually combining the data engineers and network security professionals use to search for vulnerabilities.
By Samantha Schwartz • July 22, 2021 -
Column
Behind the Firewall: A hub for security executive information sharing
In Cybersecurity Dive's recurring column, executives tackle the issues they regularly confront, from at-home security solutions to avoided disasters.
By Naomi Eide • July 2, 2021 -
The risk of disconnect between CIOs and CISOs
Companies need their CIO and CISO working together to reach their strategic goals. Strain in the relationship is a recipe for breaches.
By Roberto Torres • July 1, 2021 -
Column
Behind the Firewall: How 5 cyber execs got started in security
The cyber field is newly formed, and talent is in high demand. The road to a career in security can vary widely, from family legacies to accidental break-ins.
By David Jones , Katie Malone , Naomi Eide • June 25, 2021 -
Infosec execs still lack direct access to the CEO: study
About 93% of IT security professionals don't report directly to their CEO, while a majority do not provide security updates to their boards of directors.
By David Jones • June 22, 2021 -
Biden confronts Putin on cyberattacks, private sector optimistic
The U.S. president drew a line with the Russian leader on critical infrastructure as the countries plan to cooperate on reducing malign activity.
By David Jones • June 17, 2021 -
Overlap concerns grow as more federal cyber officials join the ranks
With the addition of the national cyber director, confusion could arise as to who or what branch will provide guidance for private sector partners.
By Samantha Schwartz • June 16, 2021 -
Column
Behind the Firewall: How 9 execs implement cybersecurity at home
Cybersecurity follows professionals outside of the workplace as they instill best practices in their homes and communities.
By Katie Malone , Samantha Schwartz , David Jones • June 11, 2021 -
White House cyber strategy takes shape
What to expect from the national cyber director
While there are technicalities to sort out, the primary goal of the role is to fill a void in federal cybersecurity strategy across agencies and sectors.
By Samantha Schwartz • Updated June 18, 2021 -
Column
Behind the Firewall: 4 cyber executives on security disasters they avoided
Cybersecurity leaders dodge catastrophes each day — from malware to gaps in the network perimeter.
By Katie Malone , David Jones , Samantha Schwartz • May 28, 2021 -
Pinning ransomware gangs is a game of 'whack-a-mole'
Dismantling international criminal enterprises takes a combination of law enforcement, intelligence and allies. But gangs rebrand to evade detection.
By Samantha Schwartz • May 26, 2021 -
No invite needed: CISA threat hunting authority spans government networks
The SolarWinds and Microsoft Exchange hacks reinforced the government's need for a holistic view of the threat landscape.
By Samantha Schwartz • May 20, 2021 -
What 5 security chiefs learned from COVID-19
From vaccine development to barren grocery story shelves, CISOs speaking at RSA Conference 2021 discussed how they navigated security in a complex threat landscape.
By Samantha Schwartz • May 19, 2021 -
Security spending to rise, buoyed by cloud: Gartner
Cloud security was the "smallest, but fastest growing" market, according to the research firm.
By Samantha Schwartz • May 18, 2021 -
Retrieved from The White House.White House cyber strategy takes shape
White House cybersecurity order lands with a plea for private sector help
Federal action alone is not enough, the White House said, though higher government standards could improve private sector security.
By Samantha Schwartz • May 13, 2021 -
What happens if threat data isn't shared?
Threats only have meaning if companies decide they do; if an organization does not deem a threat serious enough, they can go unshared.
By Samantha Schwartz • April 30, 2021 -
Cybersecurity careers: Makeshift beginnings, technical pursuits
As the field becomes more visible, thanks to large cyberattacks and breaches invading mainstream media, more curious minds will seek employment.
By Samantha Schwartz • April 28, 2021 -
Who is making enterprise security decisions?
A leader should sign off on security systems and protocols. However, protection is weaker if decisions bottleneck with one person.
By Sue Poremba • April 26, 2021 -
Global supply chains grapple with international cyberpowers
Cybersecurity intertwines industry with geopolitics. Governments will have to grapple with how to balance national security, business continuity and intellectual property protection.
By Samantha Schwartz • April 26, 2021