Strategy: Page 22


  • Coin Stacks Sitting on A Blue Financial Graph Background
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Signs of stability emerge in turbulent cyber insurance market

    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 

    By Naomi Eide • Oct. 13, 2022
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft’s CISO on why cloud matters for security response

    Cloud can give companies insight into current and future threats as the landscape grows more complex, said Bret Arsenault.

    By Roberto Torres • Oct. 12, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Mandiant propels Google Cloud’s security prospects

    With Mandiant officially under his wing, Google Cloud CISO Phil Venables expects the incident responders to help Google become a proactive force.

    By Oct. 11, 2022
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    What is phishing-resistant multifactor authentication? It’s complicated.

    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.

    By Oct. 10, 2022
  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    studio-fi via Getty Images
    Image attribution tooltip

    CISOs, corporate boards in wide disagreement on cyber resilience

    A study backed by researchers from MIT shows corporate boards are more focused on cyber risk, but are out of alignment with CISOs on key issues. 

    By Oct. 10, 2022
  • Image attribution tooltip
    Sean M. Haffey via Getty Images
    Image attribution tooltip

    Cybersecurity needs a statewide approach, report finds

    Research from Deloitte and state CIOs shows cities often hesitate to work with states on cybersecurity to protect their autonomy, but local government cyber grants could change that. 

    By Michael Brady • Oct. 10, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Multifactor authentication is not all it’s cracked up to be

    Text message and email-based authentication aren’t just the weakest variants of MFA. Cybersecurity professionals say they are broken.

    By Oct. 5, 2022
  • A businessperson holding up a cybersecurity symbol
    Image attribution tooltip
    greenbutterfly via Getty Images
    Image attribution tooltip
    Opinion

    Why user experience is essential to identity protection

    Organizations must strike a delicate balance between maximizing end-user protection and minimizing the security-related obstacles.

    By Kapil Raina • Oct. 5, 2022
  • Padlock on credit cards and us dollars.
    Image attribution tooltip
    baona via Getty Images
    Image attribution tooltip

    Security to take an outsized role in IT spending in 2023

    “If you look across all of these categories, security is a line item in all of them,” Spiceworks Ziff Davis’ Peter Tsai said.

    By Matt Ashare • Oct. 4, 2022
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    C-suite, boards are prioritizing cybersecurity, but still expect increased threats

    Senior executives around the world are taking risk management more seriously, PwC research found, but many are still concerned about business resilience.

    By Sept. 30, 2022
  • African-American IT developer typing on keyboard with black and orange programming code on computer screen and laptop in contemporary office interior, copy space
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Google Cloud research links CI/CD to security prowess

    The benefits of automated processes for application development extend beyond organizational performance and have a positive impact on security.

    By Sept. 29, 2022
  • Cloud computing technology internet on binary code with abstract background. Cloud Service, Cloud Storage Concept. 3D render.
    Image attribution tooltip
    Peach_iStock via Getty Images
    Image attribution tooltip

    Most organizations had a cloud-related security incident in the past year

    Security leaders consider the risk of cloud-based incidents higher than on-premises incidents, yet they expect to move more applications to the cloud. 

    By Sept. 28, 2022
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber paradox: Security looms as obstacle and opportunity in cloud migration

    Data protection and compliance solutions are easing cloud adoption even as cyber concerns persist.

    By Matt Ashare • Sept. 27, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip

    How common telecom cyber risks snowball in cloud, open source

    Public cloud plays a central role in the modernization of wireless networks. But more open source software, vendors and vulnerabilities could spell trouble.

    By Sept. 23, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys’ 13th annual BSIMM study shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By Sept. 22, 2022
  • A young student walks between two lines of people holding pom-poms and high-fiving. A yellow school bus is in the background
    Image attribution tooltip
    Permission granted by Cincinnati Public Schools
    Image attribution tooltip

    The tools and strategies schools need for ransomware defense

    CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.

    By Sept. 22, 2022
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    ‘Shift-left’ software strategy challenged by security and compliance

    Developer burnout and supply chain concerns mount as companies push to begin software testing early in the development process.

    By Matt Ashare • Sept. 22, 2022
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    US government rejects ransom payment ban to spur disclosure

    Federal authorities strongly discourage organizations from paying ransoms, but Anne Neuberger of the National Security Council explains why it decided against a ban.

    By Sept. 19, 2022
  • Industrial equipment (pipes, manometer/pressure gauge, levers, faucets, indicators) in a natural gas compressor station.
    Image attribution tooltip
    Cat Eye Perspective via Getty Images
    Image attribution tooltip

    Industrial control systems face more cyber risks than IT, expert testifies

    Most ICS technology was designed more than 20 years ago and built without cyber resilience, Idaho National Laboratory's Vergle Gipson said. 

    By Sept. 16, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Microsoft cloud security exec challenges organizations to ditch outdated practices

    Modern systems and modes of attack demand a dynamic and realistic security strategy, Shawn Bice said. The problem can be managed, not solved.

    By Sept. 16, 2022
  • A stack of $20 U.S. bills lay on top of a scattering of more $20 bills.
    Image attribution tooltip
    Maksym Kapliuk via Getty Images
    Image attribution tooltip

    State education leaders prioritize cybersecurity, but lack funding

    In a survey by the State Educational Technology Directors Association, 57% of respondents said their state provides a low amount of funding for cybersecurity.

    By Anna Merod • Sept. 15, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Security vendor consolidation a priority for majority of organizations worldwide

    Gartner research shows a surge in organizations that want to reduce the complexity of their security stacks.

    By Sept. 14, 2022
  • Sen. Angus King was part of a panel with Suzanne Spaulding and Mike Montgomery at the Billington CyberSecurity Summit in Washington D.C.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    US is shoring up gaps in cyber policy, but critical goals remain unfulfilled

    Legislators say the Cyberspace Solarium Commission led to significant national security enhancements, but analysts are calling for urgent momentum on a federal law on data privacy and security.

    By Sept. 13, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google closes $5.4B Mandiant acquisition

    The Mandiant buy marks the second most expensive acquisition in Google’s history, underscoring the cloud provider’s commitment to become a standalone security brand.

    By Sept. 12, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA announces RFI for critical infrastructure cyber reporting mandate

    The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.

    By Sept. 9, 2022