Strategy: Page 5


  • Chatbot conversation. Person using online customer service with chat bot to get support. Artificial intelligence and CRM software automation technology. Virtual assistant on internet.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    AI is entering the enterprise application security tool stack

    Reports from Gartner and Rackspace show a broad enterprise appetite to weave AI into the tool stack, especially across application security.

    By Sept. 20, 2023
  • The CSC 2.0 report examines the progress made toward implementing the recommendations of the CSC, a congressionally mandated body that was designed to review the ability of the U.S. to deter maliciou
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    US is making headway on securing cyber infrastructure, commission says

    While Cyberspace Solarium Commission leaders praised U.S. cybersecurity improvements, they said more work is needed to secure critical infrastructure.

    By Sept. 20, 2023
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors. Explore the Trendline
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • FBI Director Chris Wray addresses the 2023 mWISE Conference from Mandiant.
    Image attribution tooltip
    Courtesy of Mandiant
    Image attribution tooltip

    FBI director urges private sector to work with the agency on cyber threats

    Christopher Wray told attendees at Mandiant’s mWISE 2023 private sector assistance contributed to the success of several recent operations.

    By Sept. 19, 2023
  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules: What’s the role of the CIO?

    CIOs are on the front lines of managing the IT estate, making them a critical part of rapid incident response. 

    By Roberto Torres • Sept. 19, 2023
  • Sand slipping through hands cupped together.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip
    Deep Dive

    Security has an underlying defect: passwords and authentication

    Cyberattacks are fueled by the shortcomings of business authentication controls. Bad things happen when access falls apart and credentials land in the wrong hands.

    By Sept. 18, 2023
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    White House, federal cyber leaders pledge renewed support for open source security

    CISA released a roadmap for open source software security as industry officials convened to map out additional steps to protect federal agencies and the larger ecosystem.

    By Sept. 13, 2023
  • A Black person leans against the frame of a door in their office; their head hangs
    Image attribution tooltip
    FG Trade via Getty Images
    Image attribution tooltip

    IronNet considers bankruptcy after it furloughs most workers

    The furloughs will effectively end most of the cybersecurity firm’s operations unless it can find additional sources of liquidity.

    By Sept. 12, 2023
  • Jen Easterly speaks during a fireside chat at the Billington Cybersecurity Summit.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA director: Critical infrastructure cyber incident reporting rules almost ready

    The Cybersecurity and Infrastructure Security Agency is in the final stages of work on the reporting requirements included in a March 2022 law.

    By Sept. 8, 2023
  • Acting National Cyber Director Kemba Walden speaks during the Billington Cybersecurity Summit on Sept. 5, 2023 in Washington, D.C.
    Image attribution tooltip
    Permission granted by ZeroFox
    Image attribution tooltip

    Cybersecurity investments boost profitability, resilience: White House

    Expenditures on resilience will help companies reduce downtime, Acting National Cyber Director Kemba Walden said at the Billington Cybersecurity Summit.

    By Sept. 6, 2023
  • A group of executives meet
    Image attribution tooltip
    fizkes via Getty Images
    Image attribution tooltip

    Top 5 behaviors of successful CISOs: Gartner

    Successful CISOs are at least 1.5 times more likely to engage with emerging technologies and colleagues beyond traditional business functions, a survey shows.

    By Sept. 5, 2023
  • Close up of Gary Gensler speaking during a senate hearing
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    SEC cyber disclosure rules put CISO liability under the spotlight

    Security executives find themselves in the eye of the needle as governance and incident response come into focus.

    By Sept. 5, 2023
  • A frustrated young person in yellow sweater stands at table and touches their face with their hand while packing stuff up in office after dismissal
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Malwarebytes, within a week, acquires a company and reportedly cuts staff

    The layoffs underscore significant alterations afoot in the security sector, as the industry’s largest vendors claim share from smaller rivals.

    By Aug. 31, 2023
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike soars on security tool consolidation demand

    CEO George Kurtz said the company will consider potential acquisition targets as M&A discussions heat up across the industry.

    By Aug. 31, 2023
  • The Google logo adorns the outside of their NYC office Google Building 8510 at 85 10th Ave on June 3, 2019 in New York City.
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Mandiant blends Google Cloud, AI to automate threat hunting

    Google Cloud is bringing Mandiant’s threat hunting intelligence to customers’ Chronicle environments and infusing Duet AI across its security portfolio.

    By Aug. 29, 2023
  • The Four-Day Workweek, Job Openings, and Reducing the Cost of Cyber Risks: Trial Balance
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Cyber insurance providers increase scrutiny on enterprise risk, report finds

    Policyholders face higher costs and additional exclusions, even as the market stabilizes, a study on behalf of Delinia found.

    By Aug. 29, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Software industry urged to assume risk on open source security

    The Open Source Security Foundation called on commercial and non-commercial organizations that use open source software components to adopt better security practices.

    By Aug. 25, 2023
  • Group of senior leaders discussing technology initiatives
    Image attribution tooltip
    pixelfit via Getty Images
    Image attribution tooltip

    Generative AI tips and warnings from 5 providers

    Understanding model limitations and keeping humans in the loop is critical to productive adoption of AI, according to several software leaders.

    By Lindsey Wilkinson • Aug. 25, 2023
  • A textbox with five stars blocking out a word and a lock to simulate password protection.
    Image attribution tooltip
    kaedeezign via Getty Images
    Image attribution tooltip
    Opinion

    Government investigation puts spotlight on password insecurity

    A team working for the Department of Interior’s inspector general successfully cracked 1 in 5 active user passwords, a ratio that highlights traps in cybersecurity standards, Mike Kosask from LastPass writes.

    By Michael Kosak • Aug. 24, 2023
  • Image of cloud data center, 3d rendering.
    Image attribution tooltip
    mesh cube via Getty Images
    Image attribution tooltip

    For security to benefit from AI, companies need to shore up their data

    CISOs need to address the structure, management and curation of data as they pursue benefits from generative AI, according to an IDC report.

    By Aug. 24, 2023
  • Hourglass projects a dollar sign as shadow against a black/grey background
    Image attribution tooltip
    LdF via Getty Images
    Image attribution tooltip

    Ransomware attack dwell times fall, pressuring companies to quickly respond

    The median dwell time for ransomware attacks hit a new low of five days in the first half of the year, according to Sophos.

    By Aug. 23, 2023
  • Header image for "Will Automation Cause Finance Job Losses After All?"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SentinelOne pursues potential sale amid slow growth, report says

    The cybersecurity firm recently announced job cuts and is competing in a turbulent market in recent months.

    By Aug. 22, 2023
  • An employee speaks during a meeting on a SaaS video conferencing solution.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Zoom’s AI terms overhaul sets stage for broader data use scrutiny

    The shift to adopt generative AI has created tension between SaaS vendors' data desires and enterprises' security concerns.

    By Lindsey Wilkinson • Aug. 22, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks posts strong Q4 amid consolidation, new SEC rules

    Despite spooking analysts with an unusual late Friday earnings presentation, investors breathed easy as the company shared a positive outlook in its earnings report. 

    By Aug. 21, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Cyber authorities have a plan to defend remote monitoring tools

    Threat actors can turn one point of attack into many by targeting remote management services that lack security controls.

    By Aug. 18, 2023
  • Wall Street sign in the financial district of New York City.
    Image attribution tooltip
    JaysonPhotography via Getty Images
    Image attribution tooltip

    Palo Alto Networks closely watched ahead of late Friday Q4 report

    The cybersecurity firm's unusually timed fiscal fourth-quarter earnings report comes amid turbulence in the sector.

    By Aug. 18, 2023