Strategy


  • The seal of the Federal Communications Commission.
    Image attribution tooltip
    Mark Wilson / Getty Images via Getty Images
    Image attribution tooltip

    FCC expands cooperation with states on data security, privacy enforcement

    More states are working with the agency to investigate possible violations of consumer privacy and data security laws.

    By Oct. 22, 2024
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISOs are gaining influence among corporate leadership

    A Deloitte Global report shows CISOs are involved in a growing set of strategic decisions about digital transformation, cloud and other technology issues.

    By Oct. 21, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Merger and acquisition business concept, join company on puzzle pieces, 3d rendering
    Image attribution tooltip
    nespix via Getty Images
    Image attribution tooltip

    Sophos to buy Secureworks in $859M push into XDR

    The deal follows a marketwide push for vendor consolidation and a growing interest in more end-to-end offerings from a single provider.

    By Oct. 21, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft confirms partial loss of security log data on multiple platforms

    The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.

    By Oct. 18, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    FBI, CISA seek input on software security, configuration changes

    Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.

    By Oct. 17, 2024
  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Majority of global CISOs want to split roles as regulatory burdens grow

    Trellix research shows rising cybersecurity demands from the SEC and other government bodies are pushing CISOs even closer to the edge.

    By Oct. 15, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    Where organizations invest after a data breach

    Asking customers to foot the bill for data breach remediation will not prevent future data breaches or address the issues that cause costs to increase.

    By Sue Poremba • Oct. 14, 2024
  • Tines story header image
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    Leading CISOs weigh in on AI’s role in security: 7 key takeaways

    Learn how CISOs are approaching AI adoption and embracing innovation -- while mitigating risk.

    By Thomas Kinsella, COO and co-founder • Oct. 14, 2024
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Decrease in deals and large rounds cut cyber funding to $2.1B in Q3

    The decline in funding accentuates the inconsistent pace of venture capital investments in cyber startups.

    By Oct. 10, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Cyber risk tops C-suite concerns heading into US election

    A report by PwC shows American business leaders will continue to focus on data regulation, AI and technology investments regardless of which party prevails in November.

    By Oct. 10, 2024
  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip
    Deep Dive

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

    By Lindsey Wilkinson • Oct. 9, 2024
  • An empty boardroom inside a corporate office, with an aerial view of New York City from the adjacent window
    Image attribution tooltip
    ismagilov via Getty Images
    Image attribution tooltip

    CISOs, C-suite remain at odds over corporate cyber resilience

    Security and IT executives, more than a year after a SEC vote on incident disclosure, still face an uphill battle to articulate risk strategy.

    By Oct. 7, 2024
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Counter Ransomware Initiative summit emphasizes arduous effort

    An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

    By Oct. 7, 2024
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    United Airlines leaned on real-time data to recover from the CrowdStrike outage

    The airline modernized its technology foundations with better customer experiences in mind. Then, a major software outage underscored the importance of live data.

    By Matt Ashare • Oct. 4, 2024
  • Exterior of CrowdStrike office in Sunnyvale, California.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    What’s next for CrowdStrike on the road to repair its reputation?

    The cybersecurity vendor finds itself operating from a vulnerable position. Efforts to earn back trust are complex and some require industrywide support.

    By Oct. 3, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Two-thirds of healthcare organizations hit by ransomware in past year: survey

    Nearly 40% of healthcare organizations reported it took more than a month to recover after an attack, according to the survey by cybersecurity firm Sophos.

    By Emily Olsen • Oct. 2, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • A over the shoulder shot of woman using smartphone with Two-Factor Authentication security while logging to laptop.
    Image attribution tooltip
    gahsoon via Getty Images
    Image attribution tooltip

    Customers are done with passwords. Do businesses have a solution?

    Research shows customers are frustrated with the login experience, and the friction can cost businesses customers.

    By Kristen Doerer • Sept. 30, 2024
  • Man studying see-through display depicting computer code.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    For Google to reduce memory-safety defects, it focused on new code

    Google’s experience provides software developers a roadmap to address one of the most persistent security problems: memory-safety CVEs.

    By Sept. 26, 2024
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike CEO pushes ‘resilient by design’ framework, promising changes

    The cybersecurity vendor is embracing a new business framework to address security deployment lapses and the fragility of interconnected systems.

    By Sept. 26, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024
  • Sen. Angus King discussed a report on the implementation of cybersecurity recommendations during a presentation on Sept. 19, 2024 in Washington D.C.
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    Cyber commission seeks detailed plan to secure high-risk infrastructure

    A report said most recommendations from the Cyberspace Solarium Commission are near completion, but also called for greater private-sector collaboration and insurance reforms.

    By Sept. 25, 2024
  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

    By Sept. 25, 2024
  • an employee looks into a screen showing a chatbot interface
    Image attribution tooltip
    Laurence dutton via Getty Images
    Image attribution tooltip

    Data privacy concerns swirl around generative AI adoption

    IT and business professionals fear the technology's adoption can lead to data leakage, according to a Deloitte report.

    By Roberto Torres • Sept. 25, 2024
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft names deputy CISOs, flushes dead accounts as part of internal security overhaul

    The company released a progress report on efforts to revamp its internal security culture and governance.

    By Sept. 23, 2024