Strategy


  • An IBM sign stands outside an IBM building May 10, 2005 in downtown Chicago, Illinois.
    Image attribution tooltip
    Tim Boyle / Staff via Getty Images
    Image attribution tooltip

    Palo Alto Networks signs broad enterprise cybersecurity partnership with IBM

    The enterprise security giant will capitalize on a platform consolidation strategy as IBM concedes on transition to cloud security.

    By May 16, 2024
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Cybersecurity leaders expect their SOC budgets to grow, KPMG finds

    Average annual SOC budgets stand at $14.6 million, but most security leaders expect their budgets and headcount to grow by up to 20% over the next two years, the survey found.

    By Maura Webber Sadovi • May 15, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors. Explore the Trendline
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    Unsafe software development practices persist, despite CISA’s push

    The industry isn’t making sufficient progress in cleaning up code despite recurring efforts from the agency to eliminate entire classes of vulnerabilities.

    By May 15, 2024
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurance costs are stabilizing as global market grows

    Increased capacity is helping to meet rising demand for cyber coverage and more insurers are using tools to assess potential risk, a report from S&P Global Ratings shows.

    By May 14, 2024
  • Binary code of ones and zeros
    Image attribution tooltip
    deberrar/Getty Images via Getty Images
    Image attribution tooltip

    Cyber pros weigh an intel-sharing quandary: What to share when attacks hit close to home

    The detail and speed with which companies share information after an attack can prevent future pain. But businesses aren’t always keen on transparency.

    By May 14, 2024
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    jariyawat thinsandee via Getty Images
    Image attribution tooltip

    Only one-third of firms deploy safeguards against generative AI threats, report finds

    Generative AI gives attackers an edge over cyber defenders, according to a Splunk survey of security experts.

    By Jim Tyson • May 13, 2024
  • Digital code streams featuring programming symbols and data on a dark blue background
    Image attribution tooltip

    shutterstock.com/Who is Danny

    Image attribution tooltip
    Sponsored by Synopsys

    Don’t be afraid of GenAI code, but do be wary

    Don’t fall for scare headlines about GenAI code—it offers multiple benefits—but also be aware of its limits and risks.

    May 13, 2024
  • The White House in Washington, D.C.
    Image attribution tooltip
    TriggerPhoto via Getty Images
    Image attribution tooltip

    White House wants to hold the software sector accountable for security

    Federal officials are taking steps toward a long-stated goal of shifting the security burden from technology users to the companies that build it.

    By May 10, 2024
  • A signage of Microsoft is seen on March 13, 2020 in New York City.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Officials see a real change in Microsoft’s security plans: financial accountability

    CISA Director Jen Easterly pointed to Microsoft’s decision to link security to executive compensation as a meaningful signal of its priorities.

    By May 10, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    68 tech, security vendors commit to secure-by-design practices

    CISA said companies ranging from Microsoft to Palo Alto Networks signed the voluntary pledge in an effort to boost resiliency and increase transparency around CVEs and cyberattacks.

    By May 9, 2024
  • Cybersecurity professionals walk into the RSA Conference at the Moscone Center in San Francisco on May 6, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive/Cybersecurity Dive
    Image attribution tooltip

    CISA explains why it doesn’t call out tech vendors by name

    Federal officials rarely criticize tech companies when their mistakes result in attacks. The stinging conclusions CSRB levied at Microsoft are an exception, not the norm.

    By May 9, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    The US really wants to improve critical infrastructure cyber resilience

    A report from the Office of the National Cyber Director highlights persistent threats targeting healthcare and water, echoing warnings from cyber officials earlier this year. 

    By May 8, 2024
  • Female Developer Thinking and Typing on Computer, Surrounded by Big Screens Showing Coding Language
    Image attribution tooltip

    shutterstock.com/Gorodenkoff

    Image attribution tooltip
    Sponsored by Synopsys

    5 considerations for securing your software supply chain

    Do you know what’s in your code? These five considerations should help you drive your security activities and identify weak points in your software supply chain.

    By Mike McGuire, Sr. Software Solution Manager, Synopsys • May 6, 2024
  • Industrial Engineer working and control robotics with monitoring system software and icon industry network connection on tablet
    Image attribution tooltip
    ipopba via Getty Images
    Image attribution tooltip
    Sponsored by Indiana University

    How can AI companies navigate a complex regulatory framework? — Compliance Labels

    The rapid unregulated growth in the field of artificial Intelligence has given rise to Large Language Models (LLM’s) such as GPT-4 and Gemini which has contributed to major technical advancements but has also been coupled with legal and ethical issues.

    By Sai Prasad, Security Analyst, CyberProof, MS Cybersecurity Risk Management '22 • May 6, 2024
  • Azure OpenAI confidentiality loophole
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft restructures security governance, aligning deputy CISOs and engineering teams

    The company will enhance management roles under the CISO and partially tie compensation to security performance.

    By May 3, 2024
  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox lowers sales outlook as recovery from 2023 cyberattack continues

    The cleaning products maker is still working to fully restore distribution capabilities after the attack.

    By May 3, 2024
  • Andy Jassy, Amazon President & CEO attends the Los Angeles Premiere of Amazon Prime Video's "The Lord Of The Rings: The Rings Of Power" at The Culver Studios on August 15, 2022 in Culver City, Califor
    Image attribution tooltip
    Kevin Winter / Staff via Getty Images
    Image attribution tooltip

    Amazon CEO touts AWS cloud security as AI risk concerns mount

    Andy Jassy urged enterprises “not to overlook the security and operational performance” of cloud-based generative AI services. “It’s less sexy, but critically important.”

    By Matt Ashare • May 3, 2024
  • CEO Satya Nadella of Microsoft pictured on stage with the Microsoft logo in the background.
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip
    Deep Dive

    At Microsoft, years of security debt come crashing down

    Critics say negligence, misguided investments and hubris have left the enterprise giant on its back foot.

    By April 30, 2024
  • Shot of a programmer looking stressed out while working on a computer code at night.
    Image attribution tooltip

    shutterstock.com/PeopleImages.com - Yuri A

    Image attribution tooltip
    Sponsored by Synopsys

    What to do when your team is struggling to manage too many application security vendors

    A good ASPM solution will correlate and analyze data from a variety of sources, allow you to administer and orchestrate security tools, and automate your security policies.

    April 29, 2024
  • Microsoft CEO Satya Nadella addresses shareholders during Microsoft Shareholders Meeting December 3, 2014 in Bellevue, Washington.
    Image attribution tooltip
    Stephen Brashear / Stringer via Getty Images
    Image attribution tooltip

    Microsoft CEO says security is its No. 1 priority

    The comments from Satya Nadella come weeks after a withering report from the federal Cyber Safety Review Board scrutinized how the company prioritized speed to market over security.

    By April 26, 2024
  • Abstract black and white monochrome art with surreal funnel.
    Image attribution tooltip
    Philipp Tur/Getty Images Plus via Getty Images
    Image attribution tooltip

    What is success in cybersecurity? Failing less.

    Defenders aren’t measured by pure wins or losses. Intrusions will happen, and their job is to keep a bad situation from getting worse.

    By April 26, 2024
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA director pushes for vendor accountability and less emphasis on victims’ errors

    Stakeholders need to address why vendors are delivering products with common vulnerabilities, which account for the majority of attacks, Jen Easterly said.

    By April 25, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Enterprises are getting better at detecting security incidents

    Google Cloud’s Mandiant saw significant improvements in how organizations track down threats, yet hackers are still abusing common threat vectors.

    By April 23, 2024
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurance gaps stick firms with millions in uncovered losses

    A CYE analysis of 101 breaches across various sectors revealed insurance gaps resulting in an average of $27.3 million in uncovered losses per incident.

    By Alexei Alexis • April 22, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip

    Majority of businesses worldwide are implementing zero trust, Gartner finds

    Programs are typically sponsored by C-suite executives, while the CISO is often tasked with execution, according to Gartner.

    By April 22, 2024