Strategy: Page 30


  • The White House exterior in the morning light with an American flag flying.
    Image attribution tooltip
    Chip Somodevilla / Staff via Getty Images
    Image attribution tooltip
    White House cyber strategy takes shape

    Biden administration readies 3 initiatives to curb ransomware

    The government wants cybercriminals to think twice before instigating an incident and private industry to engage more.

    By Samantha Schwartz • July 21, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: How 6 security execs screen vendors

    In the wake of high-profile vendor attacks, security due diligence prior to signing a third-party contract is a must. 

    By , July 16, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Want to quickly recover from ransomware? Plan ahead

    Security teams need to understand how the business will work when an attacker limits access to its systems.

    By July 15, 2021
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Critical goods industries face existential ransomware decisions

    For certain industries, the choice is between paying millions to settle a criminal extortion or allowing a catastrophic supply chain disruption.

    By June 30, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip
    Opinion

    3 ways to assess the effectiveness of security awareness training

    Failure to prove the effectiveness of a security awareness program can lower the executive support critical to ensuring participation in the program.

    By Richard Addiscott • June 14, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Bad actors hide in everyday IT tools, complicating detection

    Security tools automatically block certain threats, yet there's often a larger intrusion detection teams and services need to weed out.

    By Samantha Schwartz • June 9, 2021
  • Image attribution tooltip
    Courtesy of Apple
    Image attribution tooltip

    Apple's privacy, security features seen as favorable to enterprise remote work

    Experts are comparing Private Relay to protections traditionally found in VPN technology, as Apple continues to grow its enterprise presence. 

    By June 8, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Data breaches, poor cyber practices raise cost of borrowing: study

    Research from the American Accounting Association shows banks have raised interest rates on companies where customer data has been hacked.

    By June 7, 2021
  • Image attribution tooltip
    Rob Kim via Getty Images
    Image attribution tooltip

    CISOs earn higher profile with remote work, evolving threats

    Corporate boards are demanding regular updates on the latest threats, while simultaneously asking CISOs to make sure workers meet business objectives in the most secure manner possible.

    By June 3, 2021
  • Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip
    White House cyber strategy takes shape

    Biden budget proposes $58B to take on legacy tech, cybersecurity

    Legacy tech holds the federal government back, and agencies remain targets of advanced cyber crime. The budget proposal provides financial support to chip away at recovery.

    By June 3, 2021
  • Man studying on a computer
    Image attribution tooltip
    FluxFactory, E+ via Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    Rethink risk management programs post-SolarWinds, experts say

    Companies need to ensure their vendors are putting the most protections in place for their most important products and services. 

    By Samantha Schwartz • June 1, 2021
  • Sponsored
    Image attribution tooltip
    Permission granted by Axonius
    Image attribution tooltip
    Sponsored by Axonius

    The pandemic's impact on IT complexity, security priorities

    A survey of IT security pros shed light on the pandemic’s impact on IT complexity & security trends.

    By Mekhala Roy, Axonius • June 1, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: 4 cyber executives on security disasters they avoided

    Cybersecurity leaders dodge catastrophes each day — from malware to gaps in the network perimeter. 

    By , , Samantha Schwartz • May 28, 2021
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Beware open source when going zero trust, expert says

    To combat software insecurities, begin with software inventory and a software bill of materials requirement.

    By Samantha Schwartz • May 25, 2021
  • Cyber premiums rise as insurers struggle to assess risk: GAO

    Not only are insurers increasing premiums, they are lowering coverage limits "for certain perils," or types of cyberattacks, according to the report.

    By Samantha Schwartz • May 24, 2021
  • Image attribution tooltip
    Matthew Horwood via Getty Images
    Image attribution tooltip

    How security and privacy can cultivate a relationship

    Security and privacy are interwoven and layered throughout a company, motivated toward the end goal of data protection. Successful organizations recognize the overlap — and capitalize on it.

    By Samantha Schwartz • May 20, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    What 5 security chiefs learned from COVID-19

    From vaccine development to barren grocery story shelves, CISOs speaking at RSA Conference 2021 discussed how they navigated security in a complex threat landscape.

    By Samantha Schwartz • May 19, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Security spending to rise, buoyed by cloud: Gartner

    Cloud security was the "smallest, but fastest growing" market, according to the research firm. 

    By Samantha Schwartz • May 18, 2021
  • President Joe Biden participates in a conference phone call with governors affected by a snowstorm in the Midwest and southwest Tuesday, Feb. 16, 2021, in the Oval Office of the White House.
    Image attribution tooltip
    Retrieved from The White House.
    Image attribution tooltip
    White House cyber strategy takes shape

    White House cybersecurity order lands with a plea for private sector help

    Federal action alone is not enough, the White House said, though higher government standards could improve private sector security. 

    By Samantha Schwartz • May 13, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Collaboration breakdowns hurt security, transformation

    Companies that succeeded at pivoting to remote work, and managing the associated IT and cybersecurity challenges, were those that enabled cross-functional teams.

    By Roberto Torres • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
    Image attribution tooltip

    DHS cybersecurity sprints focus on ransomware, hiring

    The agency intends to undergo "the most significant hiring initiative" in its history to defend against cyberattacks, said Secretary Alejandro Mayorkas.

    By Samantha Schwartz • May 6, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Cyberthreats dog the US supply chain, complicated by global competition

    As companies acquire components and services, they need mechanisms to ensure backdoors are not lurking in their systems, experts at the Hack the Capitol 2021 conference said.

    By May 5, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    Relationships between DevOps, security warm slowly

    Some hurdles stem from miscommunication, or balancing quick product releases with undesired security gaps, research from GitLab shows. 

    By Samantha Schwartz • May 5, 2021