Strategy: Page 18


  • Businessman does Financial Analysis talks to Group of Businessspeople. Projector Screen Shows Stock Market Data, Investment Strategy, Revenue Growth.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cybersecurity funding drops sharply in Q2

    Seed funding rounds dominated, while the enterprise market continued a trend of consolidating security vendors.

    By July 11, 2023
  • Digital binary code on dark green background.
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    JumpCloud abruptly initiates mass API key reset

    The company did not specify the nature of the incident, but the sudden decision to reset all API keys could indicate something is amiss, one expert said.

    By July 10, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    TPG to buy Forcepoint’s public sector cybersecurity business for $2.45B

    The deal for Forcepoint’s government and critical infrastructure-focused business marks one of the largest in the cybersecurity market this year.

    By July 10, 2023
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    Only 5% of CISOs report to CEOs, survey finds

    CISOs are still most likely to report to the CIO, but Heidrick & Struggles expects that to change as cyber responsibilities evolve.

    By July 7, 2023
  • People walk past a building in New York City
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    IronNet in NYSE compliance crosshairs after failing to file quarterly earnings on time

    Management at the cybersecurity firm has been in talks on a deal to raise additional capital and go private. 

    By July 6, 2023
  • A robot's hands are seen typing on a computer keyboard.
    Image attribution tooltip
    XH4D via Getty Images
    Image attribution tooltip

    The role for AI in cybersecurity

    Generative AI can become an ally for new security professionals who may otherwise feel overwhelmed. For more seasoned security analysts, it can offer time to refine their skills through automation of repetitive tasks.

    By Sue Poremba • July 5, 2023
  • Woman coding with multiple monitors
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    How bad code fuels security mishaps

    Spotting code that messes up operations or hurts security requires a proactive approach — and direct insight from developers.

    By Jen A. Miller • June 30, 2023
  • The White House in Washington, D.C.
    Image attribution tooltip
    TriggerPhoto via Getty Images
    Image attribution tooltip

    White House releases cyber budget priorities for fiscal year 2025

    Federal agencies are advised to demonstrate how their spending aligns with the national cybersecurity strategy.

    By June 29, 2023
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    piranka via Getty Images
    Image attribution tooltip

    What to do after a data breach

    Long before a data breach, well-prepared companies set up incident response teams with workers from multiple departments.

    By Sue Poremba • June 29, 2023
  • Rubrik and Microsoft will partner on an agreement to speed incident response using AI and natural language processing.
    Image attribution tooltip
    Permission granted by Rubrik
    Image attribution tooltip

    Rubrik, Microsoft partner to leverage generative AI for faster incident response

    The collaboration will integrate Rubrik Security Cloud with Microsoft Sentinel and Azure OpenAI Service.

    By June 28, 2023
  • baltimore syline
    Image attribution tooltip
    jimmyweee. (2016). "Baltimore" [Photograph]. Retrieved from Flickr.
    Image attribution tooltip

    State and local governments grapple to mitigate cyber risks

    Municipalities are being pushed to step up investments amid high insurance premiums and strict demands on risk prevention.

    By June 27, 2023
  • An empty classroom shows rows of desks with one desk the focus of the camera's lens. On the desk is a notebook and pencil.
    Image attribution tooltip
    diane39 via Getty Images
    Image attribution tooltip

    How are states supporting K-12 cybersecurity amid growing threats?

    As state efforts slowly ramp up to help struggling districts, they alone can’t completely remedy cybersecurity risks, one ed tech expert said.

    By Anna Merod • June 23, 2023
  • An illustration of people using computers with dialogue bubbles and a robot on a screen.
    Image attribution tooltip
    girafchik123 via Getty Images
    Image attribution tooltip

    Cyber CEOs are all-in on generative AI

    Generative AI and LLMs are gaining attention in the security industry but not everyone is convinced the technologies will deliver the benefits promised.

    By June 21, 2023
  • A photo illustration of LastPass logos on a hard drive disk held in someone's hand.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    LastPass CEO reflects on lessons learned, regrets and moving forward from a cyberattack

    Karim Toubba is ready to talk nearly a year after LastPass suffered a cyberattack that became one of the biggest security blunders of 2022.

    By June 13, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    Cyber insurance market is stabilizing as growth remains certain, Moody’s says

    Escalating price increases have moderated as the business has become profitable. Insurance firms are placing tight controls regarding cyber hygiene practices.

    By June 8, 2023
  • Businessman sitting on stairs with pink slip in hand.
    Image attribution tooltip
    TimMcClean via Getty Images
    Image attribution tooltip

    Dragos to slash 9% of workforce, trim other costs amid sales slowdown

    The industrial cybersecurity specialist cited is reporting a longer sales cycle and is fighting to maintain long term independence.

    By June 8, 2023
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    Existing security policy for critical infrastructure needs major overhaul, commission says

    The Cyberspace Solarium Commission 2.0 says the federal relationship with the private sector is based on outdated policy.

    By June 7, 2023
  • Photo of a man, Leigh McMullen, speaking during a conference.
    Image attribution tooltip
    Courtesy of Gartner
    Image attribution tooltip

    When adopting security tools, less is more, Gartner says

    Security professionals say they want to consolidate vendors but, in actuality, Gartner fields far more calls about new technologies than reducing the cyber tech stack. 

    By Naomi Eide • June 6, 2023
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike adds threat data to generative AI push

    The security vendor plans to use different LLMs for specific purposes. It may also build some of its own, CEO George Kurtz said.

    By June 1, 2023
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs still expect cyber budget increases amid economic pressure

    A study from Nuspire shows CISOs continue to focus on maximizing value as they seek more efficient and simplified security posture.

    By June 1, 2023
  • A stack of books sits on a desk alongside chalk, eraser, a pencil holder and backpack. A red apple sits on top of the stacked books.
    Image attribution tooltip
    Atstock Productions via Getty Images
    Image attribution tooltip

    Only one-third of school districts have a full-time employee dedicated to cybersecurity

    For the last six years, cybersecurity has continued to be a top concern for ed tech leaders, according to a survey by the Consortium for School Networking.

    By Anna Merod • June 1, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks teases plans for generative AI across security services

    The security vendor is taking a restrained approach to deploying generative AI products, but the company’s leaders still believe the technology will herald a major shift for cybersecurity.

    By May 31, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    PyPI to mandate 2FA by the end of 2023

    The mandate is part of a larger effort to prevent account takeover attacks.

    By May 30, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By Matt Ashare • May 25, 2023
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    CISA updates ransomware guide 3 years after its debut

    The #StopRansomware guide, updated in partnership with the FBI, NSA and MS-ISAC, reflects aggressive new techniques used by threat actors, including double extortion.

    By May 24, 2023