Strategy


  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip

    How to manage the rising tide of CVEs

    As the volume and complexity of vulnerabilities grows, organizations are struggling to manage and mitigate the security defects. 

    By Rosalyn Page • Sept. 11, 2024
  • a row of job seekers seated in an office setting against brick wall
    Image attribution tooltip
    skynesher via Getty Images
    Image attribution tooltip

    Global cybersecurity workforce growth flatlines, stalling at 5.5M pros

    ISC2’s annual report draws some troubling conclusions for the state of cyber defense. Budget cuts, layoffs and hiring freezes are exacerbating a global staffing shortage.

    By Sept. 11, 2024
  • An abstract photo copy background in black and white. Explore the Trendline
    Image attribution tooltip
    BNMK0819 via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    A wave of rules, regulations and federal action is putting pressure on businesses to shore up security amid a backdrop of emboldened threat actors has a nice ring to it.

    By Cybersecurity Dive staff
  • Coin stacks sitting on blue financial graph background. Horizontal composition with selective focus and copy space.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Security budgets continue modest growth, but staff hiring slows considerably, research finds

    The report by IANS Research and Artico Search shows security priorities are clashing with economic realities.  

    By Sept. 10, 2024
  • AI-washing, Oddity
    Image attribution tooltip
    Poca Wander Stock via Getty Images
    Image attribution tooltip

    Cyber insurance keeps growing, as threats spur competition

    Concerns remain about aggregation risk as highlighted by the July outage of Microsoft Windows devices, according to a report from Moody’s Ratings.

    By Sept. 9, 2024
  • The sun sets on the facade of the U.S. Treasury Department.
    Image attribution tooltip
    mrbfaust via Getty Images
    Image attribution tooltip

    Key cyber insurance stakeholders urge government to help close $900B in uncovered risk

    Marsh McLennan and Zurich Insurance Group issued a white paper urging a public-private partnership to help tackle a growing coverage gap. The White House is working on a plan. 

    By Sept. 6, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House launches cybersecurity hiring sprint to help fill 500,000 job openings

    National Cyber Director Harry Coker Jr. unveiled the program as part of an effort to fill a continued gap in cyber, technology and AI positions.

    By Sept. 5, 2024
  • Binary code abstract background with US $100 dollar banknotes.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Infosec spending to hit 3-year growth peak, reach $212B next year: Gartner

    The continuation of annual double-digit growth rates, 15% next year, comes as organizations consolidate spending and reassess EPP and EDR needs.

    By Sept. 5, 2024
  • Microsoft headquarters in Redmond, Washington.
    Image attribution tooltip
    David Ryder/Getty Images via Getty Images
    Image attribution tooltip

    Microsoft is training developers on the intricacies of threat intelligence

    Cybercrime wonk Sherrod DeGrippo is taking Microsoft’s software developers and engineers on a journey into her world, the depths of threat intelligence.

    By Sept. 4, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches cyber incident reporting portal to streamline breach disclosure

    The secure portal is designed to encourage faster and more robust information sharing about malicious attacks and critical vulnerabilities.

    By Aug. 30, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike takes a revenue hit as global IT outage reckoning lingers

    Sales are taking longer to close and the cybersecurity vendor is offering discounts to stem potential customer losses.

    By Aug. 29, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    SentinelOne fields inquiries from new customers following global IT outage linked to CrowdStrike

    Companies looking to diversify their risk from disruption are approaching SentinelOne, a week after similar customer movement was reported by Palo Alto Networks. 

    By Aug. 28, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA officials credit Microsoft security log expansion for improved threat visibility

    CISA officials say they plan to hold Microsoft accountable to ensure the company lives up to its commitments.

    By Aug. 27, 2024
  • A pair of binoculars covered with code, indicating a cybersecurity breach
    Image attribution tooltip
    Marco_Piunti via Getty Images
    Image attribution tooltip

    Marketing data security threats are rising: Where CMOs see gaps

    While marketers prioritize working with data security teams, effective communication remains a struggle, according to research from the CMO Council and KPMG. 

    By Peter Adams • Aug. 23, 2024
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    US, Australian authorities lead international push to adopt event logging

    State-linked and criminal threat groups are using living-off-the-land techniques to hide their hacking activities behind regular security tools.

    By Aug. 22, 2024
  • Snowflake logo on one of the data cloud company's offices.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    After a wave of attacks, Snowflake insists security burden rests with customers

    The cloud-based data warehouse vendor remains “slightly muted” about the attacks on its customers because it wasn’t breached, CEO Sridhar Ramaswamy said.

    By Aug. 22, 2024
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Insurance coverage drives cyber risk reduction for companies, researchers say

    Companies with cyber coverage are better able to detect and respond to attacks, according to a Forrester report.

    By Aug. 21, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip
    Opinion

    3 tips to building a robust AI security strategy

    Organizations can reap bigger benefits from AI with guardrails that combine human oversight, strong underlying security architecture and technical controls.

    By Anton Chuvakin • Aug. 21, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO touts leads from CrowdStrike fallout

    In the wake of the massive IT outage, some CrowdStrike customers have entered talks with Palo Alto Networks in search of a new provider.

    By Aug. 20, 2024
  • CIO Dive Editor Roberto Torres discusses cybersecurity strategy with the City of Santa Monica CIO Feroz Merchhiya during a CIO Dive virtual event on August 14, 2024.
    Image attribution tooltip

    Permission granted by Industry Dive.

    Image attribution tooltip

    3 CIO lessons for maximizing cybersecurity investments

    Securing resources has gotten easier, said Feroz Merchhiya, City of Santa Monica CIO. But that hasn't diminished tech leaders' role in showing the value.

    By Lindsey Wilkinson • Aug. 19, 2024
  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Companies aren’t as resilient against cyber risks as they think

    Most companies fall short on business continuity as malicious threat activity continues to rise, a Cohesity study found.

    By Aug. 19, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Microsoft mandates MFA for all Azure users

    The company said it will require the identity and access control for all Azure sign-ins starting in October.

    By Aug. 19, 2024
  • Tines story graphic image.
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    The biggest blockers to AI adoption, according to CISOs (and how to remove them)

    74% of CISOs agree that the benefits of AI outweigh the risks. So what’s holding them back? Discover how to remove the biggest blockers to AI innovation.

    By Eoin Hinchy, CEO and co-founder, Tines • Aug. 19, 2024
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    It’s time to stop thinking of threat groups as supervillains, experts say

    “These villains do not have superpowers. We should not treat them like they do,” CISA Director Jen Easterly said in a keynote at Black Hat.

    By Aug. 15, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House details $11M plan to help secure open source

    National Cyber Director Harry Coker Jr., speaking at Def Con in Las Vegas, says federal assistance must be bolstered by more ownership among the community.

    By Aug. 14, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    M&A activity can amplify ransomware insurance losses, research finds

    The financial severity of claims related to ransomware attacks increased more than 400% from 2022 to 2023, the study found.

    By Alexei Alexis • Aug. 14, 2024