Strategy: Page 32


  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Confidential computing critical for cloud security, Google and Intel say

    Confidential computing aims to isolate and encrypt data in use. The technology is young, but it could deliver significant gains for cloud security.

    By Nov. 15, 2022
  • A row of blue lockers in an empty school hallway.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    K-12 schools lack resources, funding to combat ransomware threat

    One-fifth of schools spend less than 1% of their IT budgets on security, a MS-ISAC report shows.

    By Nov. 14, 2022
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Industrial technology concept showing a shipping industry and communication network.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    5 security musts for industrial control systems

    OT involves a collection of dedicated systems and physics, and that creates distinct security requirements, said Robert M. Lee, CEO and co-founder at Dragos.

    By Nov. 10, 2022
  • A stack of snack food packages from Mondelez International, including Wheat Thins, Oreos, Ritz and Sour Patch kids.
    Image attribution tooltip
    Courtesy of Mondelē​​z International
    Image attribution tooltip

    Mondelē​​z settlement in NotPetya case renews concerns about cyber insurance coverage

    The legal dispute between the snack giant and insurer Zurich American, which lasted four years, raises further questions about how insurers cover acts of cyber war.

    By Nov. 8, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Face it, password policies and managers are not protecting users

    Passwords haven’t worked as a solid security strategy in a long time. The policies are there, so why are passwords security’s weak spot?

    By Sue Poremba • Nov. 7, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    How to implement an effective system to address third-party risk

    Current processes for assessing and managing third-party cybersecurity risks are cumbersome and ineffective. CISOs must adopt new principles to address business exposure.

    By Sam Olyaei • Nov. 7, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA demystifies phishing-resistant MFA

    The “gold standard” safeguard isn’t a one-size-fits-all or all-or-nothing endeavor. For most organizations, a phased approach works best.

    By Nov. 4, 2022
  • View from above of vast vats of brown liquid.
    Image attribution tooltip
    Courtesy of Brown and Caldwell
    Image attribution tooltip

    NIST seeks water industry feedback on boosting cyber resilience

    The Biden administration is turning its security attention to the water and wastewater treatment industry, which has become vulnerable to cyberattacks as facilities grow more digital.

    By Nov. 4, 2022
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Industrial providers ramp up cyber risk posture as OT threats evolve

    The majority of industrial organizations have increased OT security budgets and conducted security audits but aging technology and staffing woes persist, a new report found. 

    By Oct. 31, 2022
  • Engineer's toolbox
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Point solutions just need to die’: The end of the one-trick security tool

    The deconstruction of security products has foisted many avoidable challenges upon organizations and the industry at large.

    By Oct. 31, 2022
  • A Microsoft logo is seen during the 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Microsoft security business surges as cloud segment hit by slumping economy

    Higher energy costs and the macro economic slowdown is impacting the company’s cloud segment, while it continues to grow its enterprise security business.

    By Oct. 26, 2022
  • Training and upskilling in data science and analytics
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Help wanted for 3.4M jobs: Cyber workforce shortage is an acute, worldwide problem

    Research from (ICS)2 shows an ongoing skills gap in the information security space is under greater pressure than before.

    By Oct. 24, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    4 security predictions from Google’s cyber leaders

    The hopeful forecasts aren’t exclusive to Google’s cybersecurity experts. Many believe the industry is poised to deliver on its mission with greater efficiency and effect.

    By Oct. 21, 2022
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    4 ways Target dynamically tracks the most alarming threats

    The retailer’s threat analysts identify stakeholders and map adversaries’ intents and capabilities. The company notes it’s also important to not treat all threats equally.

    By Oct. 20, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Uber ex-CSO verdict raises thorny issues of cyber governance and transparency

    The former chief security officer of the ride-sharing firm is seen by many as a scapegoat for an unsupervised and unaccountable corporate culture.

    By Oct. 19, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity spending on pace to surpass $260B by 2026

    Gartner pinned annual double-digit growth on three transitionary megatrends: remote work, zero trust network access, and the cloud.

    By Oct. 18, 2022
  • Kevin Mandia, CEO, Mandiant, keynote during the Mandiant Cyber Defense Summit 2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    Mandiant CEO pledges to automate threat intel under Google

    Google’s chops in artificial intelligence, cloud computing and analytics play a central role in Mandiant’s emboldened vision.

    By Oct. 17, 2022
  • Lights reflect off of server cases.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    As cybersecurity threats rage, colleges invest in risk prevention and pay higher insurance premiums

    Cyber insurance policy renewal price increases are typically between 40% and 60%, with some increases hitting the triple digits, S&P said.

    By Rick Seltzer • Oct. 14, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    4 tips to protect IT employees from phishing attacks

    No one is perfect, and that includes your IT professionals. Here's what security experts say could help mitigate human error.

    By Lindsey Wilkinson • Oct. 14, 2022
  • Coin Stacks Sitting on A Blue Financial Graph Background
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Signs of stability emerge in turbulent cyber insurance market

    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 

    By Naomi Eide • Oct. 13, 2022
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft’s CISO on why cloud matters for security response

    Cloud can give companies insight into current and future threats as the landscape grows more complex, said Bret Arsenault.

    By Roberto Torres • Oct. 12, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Mandiant propels Google Cloud’s security prospects

    With Mandiant officially under his wing, Google Cloud CISO Phil Venables expects the incident responders to help Google become a proactive force.

    By Oct. 11, 2022
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    What is phishing-resistant multifactor authentication? It’s complicated.

    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.

    By Oct. 10, 2022
  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs, corporate boards in wide disagreement on cyber resilience

    A study backed by researchers from MIT shows corporate boards are more focused on cyber risk, but are out of alignment with CISOs on key issues. 

    By Oct. 10, 2022
  • Image attribution tooltip
    Sean M. Haffey via Getty Images
    Image attribution tooltip

    Cybersecurity needs a statewide approach, report finds

    Research from Deloitte and state CIOs shows cities often hesitate to work with states on cybersecurity to protect their autonomy, but local government cyber grants could change that. 

    By Michael Brady • Oct. 10, 2022