Strategy: Page 29
-
Sponsored by Axonius
The pandemic's impact on IT complexity, security priorities
A survey of IT security pros shed light on the pandemic’s impact on IT complexity & security trends.
By Mekhala Roy, Axonius • June 1, 2021 -
Column
Behind the Firewall: 4 cyber executives on security disasters they avoided
Cybersecurity leaders dodge catastrophes each day — from malware to gaps in the network perimeter.
By Katie Malone , David Jones , Samantha Schwartz • May 28, 2021 -
Explore the Trendline➔
.shock via Getty ImagesTrendlineRisk Management
An esclation of cyber risks facing businesses and government has made cyber resilience a major priority.
By Cybersecurity Dive staff -
Beware open source when going zero trust, expert says
To combat software insecurities, begin with software inventory and a software bill of materials requirement.
By Samantha Schwartz • May 25, 2021 -
"Government Accountability Office, Washington, DC, USA" by Cory Doctorow is licensed under CC BY-SA 2.0
Cyber premiums rise as insurers struggle to assess risk: GAO
Not only are insurers increasing premiums, they are lowering coverage limits "for certain perils," or types of cyberattacks, according to the report.
By Samantha Schwartz • May 24, 2021 -
How security and privacy can cultivate a relationship
Security and privacy are interwoven and layered throughout a company, motivated toward the end goal of data protection. Successful organizations recognize the overlap — and capitalize on it.
By Samantha Schwartz • May 20, 2021 -
What 5 security chiefs learned from COVID-19
From vaccine development to barren grocery story shelves, CISOs speaking at RSA Conference 2021 discussed how they navigated security in a complex threat landscape.
By Samantha Schwartz • May 19, 2021 -
Security spending to rise, buoyed by cloud: Gartner
Cloud security was the "smallest, but fastest growing" market, according to the research firm.
By Samantha Schwartz • May 18, 2021 -
Retrieved from The White House.White House cyber strategy takes shape
White House cybersecurity order lands with a plea for private sector help
Federal action alone is not enough, the White House said, though higher government standards could improve private sector security.
By Samantha Schwartz • May 13, 2021 -
Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
CISA left in the dark during Colonial Pipeline's initial response
With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.
By Samantha Schwartz • May 12, 2021 -
Collaboration breakdowns hurt security, transformation
Companies that succeeded at pivoting to remote work, and managing the associated IT and cybersecurity challenges, were those that enabled cross-functional teams.
By Roberto Torres • May 7, 2021 -
Targeted industrial control systems add cautionary flag to cyber defense strategies
A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference.
By David Jones • May 6, 2021 -
Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
DHS cybersecurity sprints focus on ransomware, hiring
The agency intends to undergo "the most significant hiring initiative" in its history to defend against cyberattacks, said Secretary Alejandro Mayorkas.
By Samantha Schwartz • May 6, 2021 -
Cyberthreats dog the US supply chain, complicated by global competition
As companies acquire components and services, they need mechanisms to ensure backdoors are not lurking in their systems, experts at the Hack the Capitol 2021 conference said.
By David Jones • May 5, 2021 -
Relationships between DevOps, security warm slowly
Some hurdles stem from miscommunication, or balancing quick product releases with undesired security gaps, research from GitLab shows.
By Samantha Schwartz • May 5, 2021 -
When bad actors target OT, risk is recalculated
Digital transformation is shrinking the gap between IT and OT, and organizations are called to factor diverse systems into risk calculations.
By Samantha Schwartz • May 4, 2021 -
XDR to succeed legacy technologies as emerging threats pressure security
Older SIEM and SOAR technologies are losing ground in a more sophisticated threat landscape, Forrester research shows.
By David Jones • May 3, 2021 -
CISOs call for holistic enterprise approach to third-party security risk
Companies need to consider operational resilience, and take a more focused approach in their evaluation processes.
By David Jones • April 21, 2021 -
Pfizer segmented IT/OT after a board-level security directive
The pharma company's IT and engineering organizations formed a combined security program in 2018, responsible for technology analysis and inventory.
By Samantha Schwartz • April 21, 2021 -
US companies plot return to office, raising questions on hybrid security
Remote workers are migrating to the corporate workspace, opening up a set of security challenges for CISOs.
By David Jones • April 19, 2021 -
How IT can support security in the event of a cyberattack
CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled.
By Jen A. Miller • April 13, 2021 -
How to support overworked, understaffed security operations
Strapped for resources, companies can either have their security practitioners wear too many hats, or outsource the responsibilities.
By Samantha Schwartz • April 12, 2021 -
Deep Dive
4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain
Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.
By Deborah Abrams Kaplan • April 7, 2021 -
Why SMBs miss out on the white-glove cyber insurance advantage
Insurance companies spend less time with SMBs evaluating individual risk profiles, weakening a piece of the global cyber economy.
By Samantha Schwartz • April 5, 2021 -
Half of companies lack security to support cloud-based IAM: report
Almost all (98%) of IT executives report challenges with IAM sourced from the cloud, including lack of visibility and increased complexity.
By Katie Malone • April 1, 2021 -
Enterprises lag on firmware security spending in face of rising threat
IT security officials are often more worried about the difficulty of detecting malware threats, in part because firmware attacks are hard to catch, a Microsoft-commissioned report found.
By David Jones • April 1, 2021