Strategy: Page 25


  • African-American IT developer typing on keyboard with black and orange programming code on computer screen and laptop in contemporary office interior, copy space
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Google Cloud research links CI/CD to security prowess

    The benefits of automated processes for application development extend beyond organizational performance and have a positive impact on security.

    By Sept. 29, 2022
  • Cloud computing technology internet on binary code with abstract background. Cloud Service, Cloud Storage Concept. 3D render.
    Image attribution tooltip
    Peach_iStock via Getty Images
    Image attribution tooltip

    Most organizations had a cloud-related security incident in the past year

    Security leaders consider the risk of cloud-based incidents higher than on-premises incidents, yet they expect to move more applications to the cloud. 

    By Sept. 28, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber paradox: Security looms as obstacle and opportunity in cloud migration

    Data protection and compliance solutions are easing cloud adoption even as cyber concerns persist.

    By Matt Ashare • Sept. 27, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip

    How common telecom cyber risks snowball in cloud, open source

    Public cloud plays a central role in the modernization of wireless networks. But more open source software, vendors and vulnerabilities could spell trouble.

    By Sept. 23, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys’ 13th annual BSIMM study shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By Sept. 22, 2022
  • A young student walks between two lines of people holding pom-poms and high-fiving. A yellow school bus is in the background
    Image attribution tooltip
    Permission granted by Cincinnati Public Schools
    Image attribution tooltip

    The tools and strategies schools need for ransomware defense

    CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.

    By Sept. 22, 2022
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    ‘Shift-left’ software strategy challenged by security and compliance

    Developer burnout and supply chain concerns mount as companies push to begin software testing early in the development process.

    By Matt Ashare • Sept. 22, 2022
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    US government rejects ransom payment ban to spur disclosure

    Federal authorities strongly discourage organizations from paying ransoms, but Anne Neuberger of the National Security Council explains why it decided against a ban.

    By Sept. 19, 2022
  • Industrial equipment (pipes, manometer/pressure gauge, levers, faucets, indicators) in a natural gas compressor station.
    Image attribution tooltip
    Cat Eye Perspective via Getty Images
    Image attribution tooltip

    Industrial control systems face more cyber risks than IT, expert testifies

    Most ICS technology was designed more than 20 years ago and built without cyber resilience, Idaho National Laboratory's Vergle Gipson said. 

    By Sept. 16, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Microsoft cloud security exec challenges organizations to ditch outdated practices

    Modern systems and modes of attack demand a dynamic and realistic security strategy, Shawn Bice said. The problem can be managed, not solved.

    By Sept. 16, 2022
  • A stack of $20 U.S. bills lay on top of a scattering of more $20 bills.
    Image attribution tooltip
    Maksym Kapliuk via Getty Images
    Image attribution tooltip

    State education leaders prioritize cybersecurity, but lack funding

    In a survey by the State Educational Technology Directors Association, 57% of respondents said their state provides a low amount of funding for cybersecurity.

    By Anna Merod • Sept. 15, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Security vendor consolidation a priority for majority of organizations worldwide

    Gartner research shows a surge in organizations that want to reduce the complexity of their security stacks.

    By Sept. 14, 2022
  • Sen. Angus King was part of a panel with Suzanne Spaulding and Mike Montgomery at the Billington CyberSecurity Summit in Washington D.C.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    US is shoring up gaps in cyber policy, but critical goals remain unfulfilled

    Legislators say the Cyberspace Solarium Commission led to significant national security enhancements, but analysts are calling for urgent momentum on a federal law on data privacy and security.

    By Sept. 13, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google closes $5.4B Mandiant acquisition

    The Mandiant buy marks the second most expensive acquisition in Google’s history, underscoring the cloud provider’s commitment to become a standalone security brand.

    By Sept. 12, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA announces RFI for critical infrastructure cyber reporting mandate

    The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.

    By Sept. 9, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By Sept. 7, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Most organizations remain unprepared for ransomware attacks

    Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.

    By Sept. 6, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Okta CEO pushes for passwordless future in wake of phishing attacks

    Customers that rely on passwords and log-in pages are putting their organizations at greater risk of attack, Todd McKinnon told analysts.

    By Sept. 2, 2022
  • Stock Market trading charts on display.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    CrowdStrike, Palo Alto earnings show resilience in cyber investments amid macro concerns

    Enterprises are continuing to invest in cybersecurity, but remain focused on consolidating vendors.

    By Sept. 1, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    SaaS sprawl amps up security challenges amid heightened risk

    Two-thirds of businesses say they're spending more on SaaS applications year over year, Axonius data shows.

    By Roberto Torres • Sept. 1, 2022
  • A fingerprint is scanned to prevent identity theft.
    Image attribution tooltip
    Ian Waldie via Getty Images
    Image attribution tooltip

    Multifactor authentication has its limits, but don’t blame the technology

    Despite phishing attacks that evaded authentication and engulfed many technology companies of late, organizations shouldn’t hesitate to use MFA.

    By Sept. 1, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs aim to balance investments, outsourcing against risks

    Cyberattack risk still largely comes down to human error, regardless of how much organizations spend to bolster defense.

    By Aug. 31, 2022
  • A screen with the Slack logo on the trading floor of the New York Stock Exchange.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Slack enhances platform security amid rapid expansion and heightened risk

    The enterprise messaging platform has faced increased customer concerns about security and privacy.

    By Aug. 31, 2022
  • Lloyd's employee at company headquarters
    Image attribution tooltip
    Matt Cardy via Getty Images
    Image attribution tooltip

    Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil

    Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable. 

    By Aug. 29, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Tips for how to safeguard against third-party attacks

    Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk. 

    By Aug. 25, 2022