Strategy: Page 30


  • Stock Market trading charts on display.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CrowdStrike, Palo Alto earnings show resilience in cyber investments amid macro concerns

    Enterprises are continuing to invest in cybersecurity, but remain focused on consolidating vendors.

    By Sept. 1, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SaaS sprawl amps up security challenges amid heightened risk

    Two-thirds of businesses say they're spending more on SaaS applications year over year, Axonius data shows.

    By Roberto Torres • Sept. 1, 2022
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A fingerprint is scanned to prevent identity theft.
    Image attribution tooltip
    Ian Waldie via Getty Images
    Image attribution tooltip

    Multifactor authentication has its limits, but don’t blame the technology

    Despite phishing attacks that evaded authentication and engulfed many technology companies of late, organizations shouldn’t hesitate to use MFA.

    By Sept. 1, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs aim to balance investments, outsourcing against risks

    Cyberattack risk still largely comes down to human error, regardless of how much organizations spend to bolster defense.

    By Aug. 31, 2022
  • A screen with the Slack logo on the trading floor of the New York Stock Exchange.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Slack enhances platform security amid rapid expansion and heightened risk

    The enterprise messaging platform has faced increased customer concerns about security and privacy.

    By Aug. 31, 2022
  • Lloyd's employee at company headquarters
    Image attribution tooltip
    Matt Cardy via Getty Images
    Image attribution tooltip

    Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil

    Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable. 

    By Aug. 29, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Tips for how to safeguard against third-party attacks

    Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk. 

    By Aug. 25, 2022
  • A trader sits at a computer in front of a wall of screens displaying stock informations at the New York Stock Exchange.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Cybersecurity spending strategies in uncertain economic times

    The need for strong cybersecurity programs doesn’t make it immune to cuts.

    By Sue Poremba • Aug. 25, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risk of cyberattack emerges as top concern of US executives

    A PwC study shows cyber risk is a top concern among entire C-suite and corporate boards as companies are spending additional funds to boost resilience.

    By Aug. 19, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Google Cloud’s CISO is a short-term cyber pessimist, but a long-term optimist

    Respite from seemingly omnipresent threats is hard to come by, but Phil Venables takes comfort in wins, not losses.

    By Aug. 18, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Zero trust adoption skyrockets, nearing universal adoption

    A report from Okta shows organizations fully embracing zero-trust principles, as hybrid work requires long-term changes to identity management. 

    By Aug. 16, 2022
  • Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency, testifies on Capitol Hill, October 19, 2017 in Washington, DC.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Don’t count on government, tech vendors to fix security woes, former CISA chief Krebs says

    The state of cybersecurity is bad and it’s going to get worse, Chris Krebs said at Black Hat. But somehow things might eventually get better.

    By Aug. 10, 2022
  • Team of data center system administrators and IT specialists use laptop and tablet computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AWS, Splunk lead open source effort to spot and curb cyberattacks

    A broad group of 18 tech companies are collaborating to establish a less cumbersome model for cybersecurity defense coordination.

    By Aug. 10, 2022
  • A sample phishing text message that targeted Cloudflare employees.
    Image attribution tooltip

    Cloudflare

    Image attribution tooltip

    Cloudflare thwarts ‘sophisticated’ phishing attack strategy that bruised Twilio

    Dissimilar responses from Cloudflare and Twilio bear important lessons in transparency, resiliency and access.

    By Aug. 9, 2022
  • Gas pipeline with multiple valves.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Encevo stays resilient post-attack, but it’s still assessing the data damage

    The Luxembourg energy supplier’s ability to thwart a shutdown likely empowered its refusal to pay a ransom.

    By Aug. 8, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware defense guidance risks hang-ups under many steps

    Small and mid-sized businesses don’t typically have the resources to meet every safeguard. But every action, however small, helps.

    By Aug. 4, 2022
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actors shifting tactics as Microsoft blocks, unblocks and reblocks macros

    Proofpoint researchers say criminal hackers are turning to container files and Windows shortcuts to distribute malware.

    By July 29, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Mandiant red team breaches OT servers to mimic crime group techniques

    Researchers are not aware of financially motivated actors using these techniques in the wild.

    By July 27, 2022
  • AWS logo appears in the background of a busy conference.
    Image attribution tooltip
    Noah Berger/Getty Images via Getty Images
    Image attribution tooltip

    AWS wants to be an enterprise security strategy advisor

    The cloud giant advised customers to focus on specific needs, and rely on embedded defenses running automatically behind the scenes.

    By July 27, 2022
  • Digital background with three unopened keylocks
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Sponsored by Hyperproof

    SEC's cybersecurity proposals: Why visibility into risk is at the heart of it

    The SEC is driving at a question every modern organization needs to consider: How should senior executives and boards manage cybersecurity risks?

    July 18, 2022
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurers split on what’s most important in a security posture assessment

    To keep up with demand, cyber insurers acknowledge the need to rethink the underwriting process, research from Panaseer shows.

    By Naomi Eide • July 15, 2022
  • Secretary of State Antony Blinken speaks alongside President Joe Biden.
    Image attribution tooltip
    Mark Makela/Getty Images via Getty Images
    Image attribution tooltip

    The US is losing the cyberspace race

    Decades-old policies have failed to stem a growing threat, the Council of Foreign Relations said. What if the U.S. embraced a more limited and realistic strategy?

    By July 15, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies cannot see — or protect — nearly half of all device endpoints

    Managing corporate devices was hard pre-pandemic. But as digital sprawl bloomed, visibility fell further behind. 

    By July 13, 2022