Strategy: Page 29


  • social media user
    Image attribution tooltip
    Bjork, Marten. Retrieved from Unsplash.
    Image attribution tooltip

    How companies can defend against credential theft

    Unique passwords are the best defense against credential stuffing. But users, unless forced to act differently, will stick with what makes access easy.

    By Sue Poremba • Sept. 14, 2021
  • A Black person types on a laptop
    Image attribution tooltip

    Photo by cottonbro from Pexels

    Image attribution tooltip

    InfoSec teams under pressure to compromise security for productivity: report

    Younger workers are fueling a backlash against corporate security policies designed to protect companies from malicious attacks, a study from HP Wolf Security shows.

    By Sept. 9, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • BlueVoyant ransomware ride along press release 1
    Image attribution tooltip
    Permission granted by Screenshot via BlueVoyant
    Image attribution tooltip

    What ransomware negotiations look like

    Fear can overwhelm the decision of whether to pay a ransom. But in negotiations, companies have to take a backseat.

    By Samantha Schwartz • Sept. 9, 2021
  • Business professionals in an office breakou room with see through windows, and a couple of blurred people passing by. There is an orange filter on the image.
    Image attribution tooltip

    iStock.com/pixelfit

    Image attribution tooltip
    Sponsored by Code42

    Are you ready for the second wave of digital transformation?

    In the second wave of digital transformation, understanding Insider Risk is more important than ever.  

    Sept. 7, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: What to do if your vendor has a security incident

    A vendor with a checkered past with security incidents is not automatically disqualified from future contracts. Rather, there is a playbook for due diligence.

    By Naomi Eide , Samantha Schwartz • Sept. 3, 2021
  • IT-OT crossover relitigates who is responsible for ICS security

    If companies can effectively combine their IT and OT SOCs, they could be better equipped to uncover a fuller view of the kill chain.

    By Samantha Schwartz • Sept. 2, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    What cyber insurance CEOs want to see from customers

    Insurers joined high-profile CEOs at the White House summit last week to discuss how to improve national cybersecurity. For one insurance CEO, the industry needs three points of improvement.

    By Samantha Schwartz • Aug. 31, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Why a ban on ransom payments will not work

    Those most impacted by an attack are motivated to pay. In some cases, it's not the victim company but its customers who want service restored.

    By Samantha Schwartz • Aug. 27, 2021
  • Two employees work together in an office
    Image attribution tooltip

    Photo by MART PRODUCTION from Pexels

    Image attribution tooltip

    Companies are investing in security operations but limited by talent gaps

    For some CISOs, the onus to attract talent is on them and the standards they make. 

    By Samantha Schwartz • Aug. 25, 2021
  • Closeup side view of group of mid 20's mobile application developers testing the code and fixing the issues.
    Image attribution tooltip
    gilaxia via Getty Images
    Image attribution tooltip
    Opinion

    Why most companies don't understand speed is vital to cybersecurity

    In cybersecurity folk wisdom, frequent releases are scary and the foundation for security failure. Why is there this disconnect between cybersecurity superstition and reality?

    By Kelly Shortridge • Aug. 24, 2021
  • Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    In the event of a cyber incident, think like a lawyer

    While security professionals may not be deeply involved in the legal aspects of a cyber incident, they have to be aware of attorney-client privileges.

    By Samantha Schwartz • Aug. 17, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: Security investments that will stick post-pandemic

    As long-term strategies for remote work solidify, VPNs, EDR and other tools are here to stay.

    By , Samantha Schwartz • Aug. 16, 2021
  • Photo of health visual at cybersecurity HIMSS21
    Image attribution tooltip
    Rebecca Pifer/Cybersecurity Dive
    Image attribution tooltip

    Should healthcare organizations pay to settle a ransomware attack?

    The decision goes beyond finances: In healthcare, it's a moral judgement, too.  "I don't think there's a single yes or no," said Michael Coates, former Twitter CISO.

    By Rebecca Pifer • Aug. 13, 2021
  • Image attribution tooltip
    Dean Mouhtaropoulos via Getty Images
    Image attribution tooltip

    Criminal middlemen administer access to privileged accounts

    Ransomware attacks stem from a specialized division of labor selling stolen credentials and providing unauthorized access to the enterprise, according to an IntSights report. 

    By Aug. 12, 2021
  • Image attribution tooltip
    Stefan Zaklin / Stringer / via Getty Images via Getty Images
    Image attribution tooltip
    White House cyber strategy takes shape

    How the $1.2 trillion infrastructure bill invests in cyber

    As part of the larger cyber funding injection, the legislation sets aside $100 million, allocated over five years, for the Cyber Response and Recovery Fund.

    By Samantha Schwartz • Aug. 12, 2021
  • Image attribution tooltip
    Patrick Lux via Getty Images
    Image attribution tooltip

    Is XDR the next best security solution?

    SOCs are still learning about extended detection and response and how to apply it to an existing security stack. But when properly deployed, it's an asset for incident response.

    By Samantha Schwartz • Aug. 11, 2021
  • How human instinct can interfere with cyber crisis response

    In a gut reaction to a security incident, users may make the wrong move to avoid losing data. 

    By Samantha Schwartz • Aug. 10, 2021
  • Woman studying on a computer
    Image attribution tooltip
    ijeab/Getty Images Plus via Getty Images
    Image attribution tooltip

    It's time to bridge the gap between security and development

    More than 80% of developers knowingly release applications with insecure code, but experts say security and development don't have to be at odds.

    By Brian Eastwood • Aug. 9, 2021
  • Jen Easterly, CISA director, Black Hat keynote
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    CISA takes aim at information sharing woes, launches public-private super group

    The Joint Cyber Defense Collaborative is Jen Easterly's first major initiative as CISA's second-ever director.

    By Samantha Schwartz • Aug. 6, 2021
  • Close-up view of a row of $100 bills
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    Don't ask whether to pay a ransom — ask how attackers could get in

    Paying a ransom does not always mitigate damage from the attack or unlock encrypted systems. 

    By Samantha Schwartz • Aug. 3, 2021
  • man working on laptop
    Image attribution tooltip
    Retrieved from Flickr/Amtec Photos.
    Image attribution tooltip

    Preparedness, checklists, leadership buy-in: How to build a rapid IT response

    Navigating cyberattacks and outages means companies rely on IT leaders to respond quickly, as business continuity hinges on functioning systems.

    By Roberto Torres • Aug. 2, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: 5 security leaders share incident response plans

    With a strong plan in place, security teams can jump immediately into action when a cyber incident occurs to — hopefully — mitigate the damage.

    By July 30, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip
    White House cyber strategy takes shape

    Biden orders voluntary cybersecurity performance goals for electric utilities, other critical sectors

    The president on Wednesday signed a national security memorandum that also expands and formally establishes a cross-sector Industrial Control System Cybersecurity Initiative, which was piloted by the electric sector.

    By Robert Walton • July 30, 2021
  • A JBS meatpacking plant in Greeley, Colorado.
    Image attribution tooltip
    Matthew Stockman/Getty via Getty Images
    Image attribution tooltip

    Ransomware, supply chain attacks put cyber insurers on notice

    Malicious cyber activity will force the insurance industry to raise premiums, raise standards and, in some cases, negotiate ransom payments, newly released data from Coalition shows.

    By July 28, 2021
  • Image attribution tooltip
    Tomohiro Ohsumi via Getty Images
    Image attribution tooltip

    Engineers need cybersecurity training, too

    Companies will undergo a shift in cyber culture, eventually combining the data engineers and network security professionals use to search for vulnerabilities.

    By Samantha Schwartz • July 22, 2021