Strategy: Page 2

  • A group of employees work together seriously in an office
    Image attribution tooltip
    NoSystem Images via Getty Images

    Cybersecurity jobs least likely to be impacted by economic uncertainty, (ISC)2 says

    A series of high-profile and damaging cyberattacks has underscored the critical role cybersecurity teams play, and top brass are taking notice.

    By Feb. 16, 2023
  • Abstract planet made up of squares.
    Image attribution tooltip
    Gegham Qalajyan via Getty Images

    Liberty Mutual launches global cyber office

    The office will bring a multidisciplinary approach to cyber risk just as the global insurance industry sees signs of clarity amid a turbulent market for cyber.

    By Feb. 14, 2023
  • Field with hashed passwords and a lock. Explore the Trendline
    Image attribution tooltip
    Yaroslav Myronov via Getty Images

    Passwords and authentication


    By Cybersecurity Dive staff
  • Coin stacks sitting on blue financial graph background.
    Image attribution tooltip
    MicroStockHub via Getty Images

    Economic volatility to exacerbate cyber risk in 2023

    A potential recession could lead to delayed innovation and inadequate budgets for long-term investments, the Bipartisan Policy Center said in a report.

    By Feb. 14, 2023
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images

    Zero trust is moving from hype to reality

    Organizations must plan ahead and invest in people and resources to succeed with zero trust, writes Gartner analyst John Watts. 

    By John Watts • Feb. 10, 2023
  • Looking upward at skyscrapers.
    Image attribution tooltip
    aiisha5 via Getty Images

    On deck for the business of cybersecurity: Fire sales and due diligence

    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.

    By , , Jan. 31, 2023
  • Box CEO Aaron Levie
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images

    Box CEO on the ‘perfect storm’ of challenges in cybersecurity

    “These are very, very complicated, dynamic, chaotic times on the security front,” Aaron Levie said.

    By Jan. 31, 2023
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images

    Microsoft surpasses $20B in security revenue as enterprise customers consolidate

    The company’s cybersecurity business is growing, but CEO Satya Nadella warned that customers, in an uncertain economy, are exercising caution.

    By Jan. 30, 2023
  • Man sits in an office with technical instruments in the background.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Deep Dive

    A first-hand look inside Walmart’s robust security operations

    The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart’s operations speaks to the lengths enterprises must go to remain secure. 

    By Jan. 30, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images

    Battle of the breach: Prioritizing proactive ransomware defense

    Industry will soon face a reality where organizations are attacked every two seconds by threat actors that continue to evolve. So now what?

    By Sebastian Goodwin • Jan. 25, 2023
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images

    Only half of companies have the budgets necessary to mitigate cybersecurity risks: study

    A report from Neustar shows macroeconomic pressures are leading to a squeeze on IT security spending.

    By Jan. 24, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images

    Cyber, business interruption remain top global corporate risks

    Risk management leaders remain highly concerned about the threat of malicious attacks and data breaches, according to Allianz Global.

    By Jan. 18, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images

    A ransomware negotiator shares 3 tips for victim organizations

    This is no time for knee-jerk reactions. “Take a deep breath and slow things down,” said Drew Schmitt, principal threat intelligence analyst at GuidePoint Security.

    By Jan. 18, 2023
  • Law flat icon on wooden block cube with calculator and pencil on dollar bank note money,
    Image attribution tooltip
    grapestock via Getty Images

    Surging cyberthreats, data concerns remain top dispute risks for organizations

    A survey from Baker McKenzie shows a heightened risk of legal challenges amid a rise in sophisticated cyberattacks, along with concerns about the regulatory response. 

    By Jan. 12, 2023
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images

    T-Mobile CSO: One wrong decision can wreak havoc

    Adversaries attacked a T-Mobile honeypot 65 million times a day, Timothy Youngblood recalls.

    By Jan. 11, 2023
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images

    Beazley launches historic $45M cyber catastrophe bond

    The announcement marks the first time an insurance-linked securities instrument has been created to cover catastrophic cyber risk. 

    By Jan. 10, 2023
  • Rajeev Chand, partner and head of research at Wing Venture Capital, CrowdStrike CEO George Kurtz and CISA Director Jen Easterly (left to right) discuss cybersecurity challenges on a CES panel in Las V
    Image attribution tooltip


    Tech priorities out of sync with security needs, CISA director says

    As long as priorities and incentives are misaligned, security and safety needs will remain unmet. “We can’t just let technology off the hook,” Jen Easterly said.

    By Jan. 9, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images

    6 security experts on what cyberthreats they expect in 2023

    Organizations will keep a close eye on geopolitical tension and supply chain attacks. But at the core, the biggest threats are built on mistakes.

    By , , Jan. 6, 2023
  • Lights in Europe are seen from space.
    Image attribution tooltip
    DKosig/iStock via Getty Images

    Cybersecurity trends in 2023 that will directly impact everyday life

    The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security. 

    By Sue Poremba • Jan. 3, 2023
  • A digital lock on a computer memory board with red and blue lights intersecting
    Image attribution tooltip
    Just_Super via Getty Images

    Remote, third-party workers raise security risks for enterprises: report

    A study on behalf of Talon shows third-party contractors are often engaged in risky behavior, using unmanaged devices or high-risk desktop technologies. 

    By Dec. 21, 2022
  • Workers at a security operations center at Rackspace.
    Image attribution tooltip
    Courtesy of Rackspace Technology

    Apple CIO steps down from Rackspace board citing new job duties

    Rackspace announced additional management changes while it recovers from a ransomware attack on its Hosted Exchange business. 

    By Dec. 19, 2022
  • An illustrated computer with security symbols, including a person in a face mask holding a fishing pole with things representing PII dislpayed.
    Image attribution tooltip
    bagira22 via Getty Images

    How to upgrade cybersecurity awareness training

    Phishing attacks are not always as obvious as a direct message from someone pretending to be Elon Musk asking you to buy cryptocurrency. To better equip employees, cyber training needs an upgrade. 

    By James Karimi • Dec. 12, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images

    Google stresses unmet need for software supply chain security

    The open source software ecosystem remains vulnerable, and fragmented efforts could stifle progress, according to Google.

    By Dec. 8, 2022
  • The Apple logo is displayed on the exterior of an Apple Store.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images

    Apple expands iCloud encryption, boosts MFA with security keys

    Additional security features could prevent phishing scams and lower exposure for companies that let workers use personal devices for work.

    By Dec. 8, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images

    Microsoft taps security demand to drive M365 amid fragmented market

    A top company executive said a key driver is to bundle its cybersecurity capabilities with office productivity applications, as customers look to consolidate vendors.

    By Dec. 7, 2022
  • Diverse employees team engaged in teamwork in modern boardroom
    Image attribution tooltip
    fizkes via Getty Images

    What does it take to be good at cybersecurity?

    Few large enterprises meet Deloitte’s standards for high cyber maturity. The 21% that do recognize benefits not typically associated with security.

    By Dec. 7, 2022