Strategy: Page 2


  • Training and upskilling in data science and analytics
    Image attribution tooltip
    shironosov via Getty Images

    Help wanted for 3.4M jobs: Cyber workforce shortage is an acute, worldwide problem

    Research from (ICS)2 shows an ongoing skills gap in the information security space is under greater pressure than before.

    By Oct. 24, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images

    4 security predictions from Google’s cyber leaders

    The hopeful forecasts aren’t exclusive to Google’s cybersecurity experts. Many believe the industry is poised to deliver on its mission with greater efficiency and effect.

    By Oct. 21, 2022
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images

    4 ways Target dynamically tracks the most alarming threats

    The retailer’s threat analysts identify stakeholders and map adversaries’ intents and capabilities. The company notes it’s also important to not treat all threats equally.

    By Oct. 20, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images

    Uber ex-CSO verdict raises thorny issues of cyber governance and transparency

    The former chief security officer of the ride-sharing firm is seen by many as a scapegoat for an unsupervised and unaccountable corporate culture.

    By Oct. 19, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images

    Cybersecurity spending on pace to surpass $260B by 2026

    Gartner pinned annual double-digit growth on three transitionary megatrends: remote work, zero trust network access, and the cloud.

    By Oct. 18, 2022
  • Kevin Mandia, CEO, Mandiant, keynote during the Mandiant Cyber Defense Summit 2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive

    Mandiant CEO pledges to automate threat intel under Google

    Google’s chops in artificial intelligence, cloud computing and analytics play a central role in Mandiant’s emboldened vision.

    By Oct. 17, 2022
  • Lights reflect off of server cases.
    Image attribution tooltip
    Kwarkot/iStock via Getty Images

    As cybersecurity threats rage, colleges invest in risk prevention and pay higher insurance premiums

    Cyber insurance policy renewal price increases are typically between 40% and 60%, with some increases hitting the triple digits, S&P said.

    By Rick Seltzer • Oct. 14, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images

    4 tips to protect IT employees from phishing attacks

    No one is perfect, and that includes your IT professionals. Here's what security experts say could help mitigate human error.

    By Lindsey Wilkinson • Oct. 14, 2022
  • Coin Stacks Sitting on A Blue Financial Graph Background
    Image attribution tooltip
    MicroStockHub via Getty Images

    Signs of stability emerge in turbulent cyber insurance market

    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 

    By Oct. 13, 2022
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images

    Microsoft’s CISO on why cloud matters for security response

    Cloud can give companies insight into current and future threats as the landscape grows more complex, said Bret Arsenault.

    By Roberto Torres • Oct. 12, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google

    Mandiant propels Google Cloud’s security prospects

    With Mandiant officially under his wing, Google Cloud CISO Phil Venables expects the incident responders to help Google become a proactive force.

    By Oct. 11, 2022
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images

    What is phishing-resistant multifactor authentication? It’s complicated.

    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.

    By Oct. 10, 2022
  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    studio-fi via Getty Images

    CISOs, corporate boards in wide disagreement on cyber resilience

    A study backed by researchers from MIT shows corporate boards are more focused on cyber risk, but are out of alignment with CISOs on key issues. 

    By Oct. 10, 2022
  • Image attribution tooltip
    Sean M. Haffey via Getty Images

    Cybersecurity needs a statewide approach, report finds

    Research from Deloitte and state CIOs shows cities often hesitate to work with states on cybersecurity to protect their autonomy, but local government cyber grants could change that. 

    By Michael Brady • Oct. 10, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images

    Multifactor authentication is not all it’s cracked up to be

    Text message and email-based authentication aren’t just the weakest variants of MFA. Cybersecurity professionals say they are broken.

    By Oct. 5, 2022
  • A businessperson holding up a cybersecurity symbol
    Image attribution tooltip
    greenbutterfly via Getty Images
    Opinion

    Why user experience is essential to identity protection

    Organizations must strike a delicate balance between maximizing end-user protection and minimizing the security-related obstacles.

    By Kapil Raina • Oct. 5, 2022
  • Padlock on credit cards and us dollars.
    Image attribution tooltip
    baona via Getty Images

    Security to take an outsized role in IT spending in 2023

    “If you look across all of these categories, security is a line item in all of them,” Spiceworks Ziff Davis’ Peter Tsai said.

    By Matt Ashare • Oct. 4, 2022
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images

    C-suite, boards are prioritizing cybersecurity, but still expect increased threats

    Senior executives around the world are taking risk management more seriously, PwC research found, but many are still concerned about business resilience.

    By Sept. 30, 2022
  • African-American IT developer typing on keyboard with black and orange programming code on computer screen and laptop in contemporary office interior, copy space
    Image attribution tooltip
    SeventyFour via Getty Images

    Google Cloud research links CI/CD to security prowess

    The benefits of automated processes for application development extend beyond organizational performance and have a positive impact on security.

    By Sept. 29, 2022
  • Cloud computing technology internet on binary code with abstract background. Cloud Service, Cloud Storage Concept. 3D render.
    Image attribution tooltip
    Peach_iStock via Getty Images

    Most organizations had a cloud-related security incident in the past year

    Security leaders consider the risk of cloud-based incidents higher than on-premises incidents, yet they expect to move more applications to the cloud. 

    By Sept. 28, 2022
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images

    Cyber paradox: Security looms as obstacle and opportunity in cloud migration

    Data protection and compliance solutions are easing cloud adoption even as cyber concerns persist.

    By Matt Ashare • Sept. 27, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images

    How common telecom cyber risks snowball in cloud, open source

    Public cloud plays a central role in the modernization of wireless networks. But more open source software, vendors and vulnerabilities could spell trouble.

    By Sept. 23, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys’ 13th annual BSIMM study shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By Sept. 22, 2022
  • A young student walks between two lines of people holding pom-poms and high-fiving. A yellow school bus is in the background
    Image attribution tooltip
    Permission granted by Cincinnati Public Schools

    The tools and strategies schools need for ransomware defense

    CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.

    By Sept. 22, 2022
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images

    ‘Shift-left’ software strategy challenged by security and compliance

    Developer burnout and supply chain concerns mount as companies push to begin software testing early in the development process.

    By Matt Ashare • Sept. 22, 2022