Strategy: Page 2

  • Image attribution tooltip
    AzmanL via Getty Images

    Midsize enterprises: Strengthen security for today's threat landscape

    Midsize enterprises must protect against the same security threats as larger organizations, but with smaller budgets and fewer IT resources.

    By Paul Furtado • April 4, 2022
  • The Kronos outage disrupted one employer's payroll for more than a month. Here's how it moved forward.

    UMass Memorial Health had to quickly improvise to run payroll for more than 16,000 employees without hours-worked data, CFO Sergio Melgar said. 

    By Ryan Golden • March 24, 2022
  • Trendline

    Securing remote work

    It's not just remote work businesses have to secure. Security practitioners have to protect a hybrid environment, defending remote and in-person workers alike. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Jeenah Moon via Getty Images

    Microsoft rolls out security red carpet for competitors' cloud customers

    With a cloud-agnostic security tool in hand, Microsoft is vying to support customers' multicloud strategies. 

    By Barbara DeLollis • March 23, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images

    Dinner is served: Cyber M&A feeding frenzy shows hunger for trust

    Google's $5.4 billion bid for Mandiant was just one of 200-plus cybersecurity deals last year.

    By March 17, 2022
  • Image attribution tooltip
    sefa ozel via Getty Images

    CrowdStrike shares surge on strong Q4 earnings and robust annual forecast

    The cybersecurity firm reported a blockbuster Q4 a day after rival Mandiant was acquired by Google.  

    By March 10, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images

    Google swoops in to buy Mandiant for $5.4B after weeks of market speculation

    The deal follows reported negotiations between Microsoft and the incident response specialist, which sold off its FireEye products business last year.

    By Updated March 8, 2022
  • Image attribution tooltip
    FreshSplash via Getty Images

    How HR can prepare for a cyberattack

    Incurring some risk is the nature of business, but backup plans and cybersecurity training are key.

    By Caroline Colvin • March 4, 2022
  • Image attribution tooltip
    luza studios via Getty Images

    Security hampers enterprise cloud adoption: report

    Multicloud adoption adds complexity as IT security teams struggle with alert fatigue.

    By Feb. 22, 2022
  • Cyber insurance premiums soar for energy companies

    Global politics and ransomware are driving insurance cost increases, more than doubling rates for some independent power producers. 

    By Robert Walton • Feb. 18, 2022
  • Image attribution tooltip
    Laurence Dutton via Getty Images

    Cybersecurity outlook for 2022

    Nation-state cyberthreats and Log4j have the security community on high alert; organizations need to master response and remediation.  

    By Feb. 14, 2022
  • Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive

    Mandiant stock jumps on takeover report as incident responder swings to Q4 profit

    After divesting FireEye Products, Mandiant has a streamlined portfolio, but expansion will be expensive. 

    By Feb. 9, 2022
  • Image attribution tooltip
    AzmanL via Getty Images

    Security strategies evolve while spending flatlines

    Organizations want more bang for their buck, which can mean eschewing single-use products. 

    By Brian Eastwood • Feb. 8, 2022
  • Image attribution tooltip

    iStock/Guirong Hao

    Sponsored by Keeper Security

    Smart cybersecurity budgeting in the age of ransomware

    Cut through the noise and learn how organizations can optimize their cybersecurity spend.

    Feb. 7, 2022
  • Image attribution tooltip
    luza studios via Getty Images

    Cybersecurity tool trends to watch in 2022

    For enterprises, the security priority remains doing more with less and finding tools that offer greater areas of coverage and integration.

    By Sue Poremba • Jan. 27, 2022
  • Image attribution tooltip
    Win McNamee via Getty Images

    Biden gives defense, intel agencies 180 days to apply MFA, encryption

    The White House's memorandum builds on past requirements to bolster U.S. cyber standards. This time, the administration is targeting agencies that handle classified intelligence. 

    By Samantha Schwartz • Jan. 20, 2022
  • Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    Extracting portions of open source in software development threatens app security

    While companies employ safeguards to detect flaws in applications, the likelihood of organizations running a complete database of all the places a vulnerability lives is slim.

    By Samantha Schwartz • Jan. 19, 2022
  • Image attribution tooltip
    metamorworks via Getty Images

    Can SOAR technology help SOCs regain the advantage in threat detection?

    Google's acquisition of Siemplify has placed a focus on whether automation can help restore balance in the fight against sophisticated attackers.

    By Jan. 7, 2022
  • Image attribution tooltip
    Sarah Silbiger via Getty Images

    Congressional cyber commission expires but work to continue with 'Solarium 2.0'

    Despite the commission's success, unfinished business includes setting up a joint collaborative environment, institutionalizing the Cyber Diplomacy Act, creating a bureau of cyber statistics, and codifying critical infrastructure.

    By Samantha Schwartz • Dec. 23, 2021
  • Image attribution tooltip
    South_agency via Getty Images

    Security teams prepare for the yearslong threat Log4j poses

    Industry is still investigating the full extent of the vulnerability, which limits the actions security teams can immediately take. 

    By Samantha Schwartz • Dec. 16, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images

    Long-expected cyber incident reporting rule loses ground once again

    The House's recently passed National Defense Authorization Act is set to advance to the Senate. But it omitted a key cyber rule: mandatory incident reporting. 

    By Samantha Schwartz • Dec. 10, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images

    What incident reporting could look like

    Legislation could remove some of the complexity of overlapping standards when CISA's roles and authorities become more robust. 

    By Samantha Schwartz • Dec. 10, 2021
  • Image attribution tooltip
    Luke Sharrett via Getty Images

    TSA rolls out rail cyber requirements, targeting prevention and rapid response

    The directives, with immediate implementation expected, are primarily for higher-risk freight railroads, passenger rail, and rail transit, DHS said. 

    By Samantha Schwartz • Dec. 3, 2021
  • Image attribution tooltip
    Dan Kitwood via Getty Images

    Crypto becoming the preferred currency of cybercriminals and rogue governments

    Authorities are turning the tables on cybercriminals by tracing the steps of illicit transactions and making it more difficult for ransomware operators to evade detection.

    By Nov. 24, 2021
  • Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    What to consider when connecting cyber, business strategy

    The common issue security and business leaders run into is miscommunication, Gartner's Jeffrey Wheatman said.

    By Samantha Schwartz • Nov. 17, 2021