Strategy


  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA director pushes for vendor accountability and less emphasis on victims’ errors

    Stakeholders need to address why vendors are delivering products with common vulnerabilities, which account for the majority of attacks, Jen Easterly said.

    By April 25, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Enterprises are getting better at detecting security incidents

    Google Cloud’s Mandiant saw significant improvements in how organizations track down threats, yet hackers are still abusing common threat vectors.

    By April 23, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors. Explore the Trendline
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurance gaps stick firms with millions in uncovered losses

    A CYE analysis of 101 breaches across various sectors revealed insurance gaps resulting in an average of $27.3 million in uncovered losses per incident.

    By Alexei Alexis • April 22, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip

    Majority of businesses worldwide are implementing zero trust, Gartner finds

    Programs are typically sponsored by C-suite executives, while the CISO is often tasked with execution, according to Gartner.

    By April 22, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Opinion

    The art of threat modeling: 3 frameworks to know

    Organizations should use the frameworks in a manual or automated way to better understand the security threats they’re up against, Gartner’s William Dupre writes. 

    By William Dupre • Updated April 24, 2024
  • In this photo illustration, the welcome screen for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023 in London, England. OpenAI,
    Image attribution tooltip
    Leon Neal / Staff via Getty Images
    Image attribution tooltip

    ChatGPT grabs the shadow IT crown: report

    Generative AI tools emerged as the latest villain in the enterprise battle to curb SaaS bloat and rationalize software portfolios, Productiv analysis found.

    By Matt Ashare • April 16, 2024
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Top officials again push back on ransom payment ban

    In lieu of a ban, the Institute for Security and Technology advises governments to achieve 16 milestones, most of which are already in place or in the works.

    By April 15, 2024
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISA to big tech: After XZ Utils, open source needs your support

    The attempted malicious backdoor may have been part of a wider campaign using social engineering techniques, the open source community warned.

    By April 15, 2024
  • Hacker in Work. High Speed Computer Keyboard Typing by Professional Hacker.
    Image attribution tooltip

    shutterstock.com/Virrage Images

    Image attribution tooltip
    Sponsored by Synopsys

    DevSecOps, done right, can achieve both speed and security in software development

    You don’t have to choose between speed or security if you do DevSecOps correctly. Learn how.

    April 15, 2024
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISO role shows significant gains amid corporate recognition of cyber risk

    A report from Moody’s Ratings shows CISOs and other senior-level cyber executives have become key decision makers within the C-suite. 

    By April 9, 2024
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Industry stakeholders seek 30-day delay for CIRCIA comments deadline

    Industry officials are asking for additional time to comb through hundreds of pages of detailed rules about disclosure of covered cyber incidents and ransom payments.

    By April 8, 2024
  • Rendered graphics with laptop, hand and dumbbell.
    Image attribution tooltip
    Permission granted by Fortinet
    Image attribution tooltip
    Sponsored by Fortinet

    The top 5 SecOps strategies to strengthen business in 2024

    Learn the importance of specialized security fueled by artificial intelligence and machine learning, why comprehensive coverage from attacks is critical and how to embrace new methods of supporting your IT teams.

    April 8, 2024
  • Dollars flowing through the tunnel with binary code texture.
    Image attribution tooltip
    adventtr via Getty Images
    Image attribution tooltip

    Cybersecurity venture funding remains weak, near three-year low

    Quarterly funding levels hit $2.3 billion in Q1 2024, a far cry from the $8 billion high the market achieved in the final quarter of 2021, according to Pinpoint Search Group.

    By April 5, 2024
  • A row big buildings with small shop storefronts underneath.
    Image attribution tooltip
    Mshake via Getty Images
    Image attribution tooltip

    What’s missing for SMBs? A solid cybersecurity culture

    Small businesses can be especially vulnerable to cyberattacks because of their limited resources, and few have employees on staff who truly understand the value of secure business operations.

    By Sue Poremba • April 1, 2024
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    Water woes: A federal push for cyber mitigation is highlighting the sector’s fault lines

    The water utility industry says they recognize the heightened threat environment, but the current federal push fails to account for their resource constraints.

    By March 28, 2024
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    CISA issues notice for long-awaited critical infrastructure reporting requirements

    CIRCIA will require covered entities to promptly disclose major cyber incidents and ransomware payments.

    By March 27, 2024
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Marsh launches group captive insurance firm for cyber

    The company wants to provide larger, financially stable companies with alternatives for managing risk, after years of volatility in pricing and coverage.

    By March 25, 2024
  • Photo illustration of a VF Corp. SEC filing.
    Image attribution tooltip

    Photo illustration: Industry Dive; US Securities and Exchange Commission

    Image attribution tooltip

    How companies describe cyber incidents in SEC filings

    The words businesses use in cybersecurity disclosures matter. They can channel confidence in the recovery process, potential impacts and legal liabilities.

    By March 19, 2024
  • Sponsored by Palo Alto Networks

    Security consultation is a non-negotiable for M&A activity

    Over 20% of external cloud services change monthly. Without visibility, it is easy to lose track of changes and prevent risks. Get the report to learn more.

    By Matt Kraning, CTO, Cortex, Palo Alto Networks • March 18, 2024
  • Header image for "56% of Business Leaders Are Incorporating AI Into Cybersecurity: Weekly Stat"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    Audit committees rank cybersecurity as top priority amid SEC crackdown

    Cyberattacks are just one of several rapidly changing threats confronting audit committees, according to the Center for Audit Quality and Deloitte.

    By Jim Tyson • March 14, 2024
  • Google corporate logo outside Google Germany offices in Berlin, Germany.
    Image attribution tooltip
    Sean Gallup / Getty Images News via Getty Images
    Image attribution tooltip

    Google Cloud CISO spots asymmetric advantage for AI in defense

    Organizations have the upper hand in using generative AI for security because it’s trained on data they own and context they tune against it, Phil Venables says.

    By March 13, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Ransomware festers as a top security challenge, US intel leaders say

    U.S. intelligence leaders warn ransomware activity is growing, despite high profile efforts to seize threat actors’ infrastructure.

    By March 12, 2024
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    What’s behind the demand for MDR and IAM systems

    It's not just the front door businesses need to protect. Organizations also have to recognize the damage threat actors can do once they’re inside.

    By Sue Poremba • March 7, 2024
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike dodges pricing war with Palo Alto Networks

    CEO George Kurtz called out CrowdStrike's largest competitor, dismissing Palo Alto Network's strategy of free incentives. "Free is never free," he said.

    By March 6, 2024
  • An open atrium filled with plants with stars crossing open floors.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    AWS CISO: Generative AI is just a tool, ‘not a magic wand’

    Attackers and defenders have access to the same capabilities in generative AI. Clear advantages for either side have yet to materialize.

    By March 5, 2024