Strategy: Page 15


  • Wall Street sign in the financial district of New York City.
    Image attribution tooltip
    JaysonPhotography via Getty Images
    Image attribution tooltip

    Palo Alto Networks closely watched ahead of late Friday Q4 report

    The cybersecurity firm's unusually timed fiscal fourth-quarter earnings report comes amid turbulence in the sector.

    By Aug. 18, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Suncor CEO says company mostly recovered from June cyberattack

    The incident was serious and not worth repeating, President and CEO Rich Kruger said. "I’d rather have a root canal than go through one of these attacks again.”

    By Aug. 17, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Person pushing large stone uphill
    Image attribution tooltip
    Nastco via Getty Images
    Image attribution tooltip

    Security basics aren’t so basic — they’re hard

    Lax security controls cause heavy damages, and security experts warn how unmet basics turn up, time and again, when things go wrong.

    By Aug. 17, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, AWS’ Mark Ryland told Cybersecurity Dive.

    By Aug. 16, 2023
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    How disjoined threat intelligence limits companies — and what to do about it

    There’s no shortage of research on attackers, but for many CISOs, turning those insights into action is a difficult endeavor.

    By Aug. 15, 2023
  • Acting National Cyber Director Kemba Walden speaking at Black Hat 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Why Walden thinks this national cybersecurity strategy will work

    The acting national cyber director, armed with more talent at the federal level and an implementation plan, is striving for lasting impact.

    By Aug. 11, 2023
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    White House wants input on open source security, memory-safe languages

    Federal agencies put out a request for information Thursday, building on Biden administration priorities to help secure open source post-Log4j.

    By Aug. 11, 2023
  • three adults stand on a stage in front of a yellow curtain. One adult is standing at a podium and speaking.
    Image attribution tooltip
    Kara Arundel/Cybersecurity Dive, data from White House
    Image attribution tooltip

    3 best practices from the White House K-12 cybersecurity summit

    School leaders must take prevention seriously and know who to call when an attack happens, government officials and educators said.

    By Kara Arundel • Aug. 11, 2023
  • Woman speaking on stage in front of a purple curtain in a black blazer and sparkly pants. There is also a podium that says "Black Hat USA 2023."
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    4 ways organizations can take back the advantage from attackers

    By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023. 

    By Aug. 10, 2023
  • Woman in a black suit stands behind a podium with a sign that reads "enhancing cybersecurity protecting New Yorkers."
    Image attribution tooltip
    Courtesy of Darren McGee/ Office of Governor Kathy Hochul
    Image attribution tooltip

    New York rolls out statewide cybersecurity strategy

    The strategy follows previous steps to enhance local cybersecurity and protect critical infrastructure across the state.

    By Aug. 10, 2023
  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Rapid7 to cut 18% of workforce, shutter certain offices

    The cybersecurity firm had been the subject of speculation about pursuing a possible sale.

    By Aug. 9, 2023
  • The United States Capitol Building seen at a distance.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    NIST releases draft overhaul of its core cybersecurity framework

    It marks the first major update to federal risk guidance since 2014 and incorporates new issues, including supply chain security and threats to small business.

    By Aug. 9, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Aug. 9, 2023
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurer Resilience raises $100M in expansion bid

    The company plans to use the funding to assist the global expansion and scale the adoption of its recently launched cyber-risk platform.

    By Alexei Alexis • Aug. 8, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS pledges $20M to K-12 cyber training, incident response

    The cloud services provider is participating in a broad White House plan to build additional protection to defend schools against ransomware and other threats.

    By Aug. 7, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA seeks to address visibility, resilience in 3-year strategic plan

    The agency outlined a major push to recognize and respond to immediate cyberthreats and make secure development practices a priority.

    By Aug. 7, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Inside the most-commonly exploited CVEs of 2022

    Delayed patching and unmet secure-by-design principles are aggravating the risk of compromise, the Five Eyes warned Thursday.

    By Aug. 4, 2023
  • IT Programer Working on Desktop Computer in Data Center System Control Room
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Broad SBOM adoption takes root as businesses watch their supply chains

    Research from Sonatype shows major companies are increasingly mandating outside vendors to account for the security of their applications.

    By Aug. 4, 2023
  • An executive signs paperwork inside a meeting room, two workers sitting at either side
    Image attribution tooltip
    NoSystem Images via Getty Images
    Image attribution tooltip

    C-suite, rank-and-file at odds over security’s role

    Security is a priority when implementing a cloud strategy, 50% of executives said in a May survey. Most security workers beg to differ.

    By Roberto Torres • Aug. 4, 2023
  • SEC reporting
    Image attribution tooltip
    Kobus Louw via Getty Images
    Image attribution tooltip

    Businesses improved cyber incident response times following Log4j, report finds

    An Immersive Labs study showed security teams improved response times during attacks, but post-incident recovery still lagged.

    By Aug. 2, 2023
  • U.S. President Joe Biden delivers remarks alongside Vice President Kamala Harris at the Congressional Picnic on the South Lawn of the White House on July 19, 2023 in Washington, DC.
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    White House looks to close massive cyber skills gap

    The Biden administration is moving to address a yearslong shortage of qualified IT security and technology industry workers.

    By Aug. 1, 2023
  • A piggy bank sits next to stack of coins to represent growing investments
    Image attribution tooltip
    Khanisorn Chaokla via Getty Images
    Image attribution tooltip

    Generative AI risks loom as businesses increase investments

    Even when risks associated with the tech are identified, most businesses aren’t putting in the work to mitigate them.

    By Lindsey Wilkinson • Aug. 1, 2023
  • People sitting around a board room table
    Image attribution tooltip
    Caiaimage/Paul Bradbury via Getty Images
    Image attribution tooltip
    Opinion

    How to communicate data risk to the business

    Data risk communications must be objective, pragmatic and clearly focused on the best interests of the organization to be effective, Gartner’s Joerg Fritsch writes. 

    By Joerg Fritsch • July 31, 2023
  • A wall showing a Merck & Co. logo in Kenilworth, New Jersey
    Image attribution tooltip
    Courtesy of Merck & Co.
    Image attribution tooltip

    New Jersey Supreme Court to hear Merck insurance dispute over NotPetya attack

    The pharmaceutical giant previously won lower court rulings regarding war exclusion language. 

    By July 28, 2023
  • A photo of the White House.
    Image attribution tooltip
    PorqueNoStudios/iStock via Getty Images
    Image attribution tooltip

    To execute the national cyber strategy, it’s going to take the whole US government

    Experts applaud the desired outcomes, but the tasks and responsibilities now assigned to agencies underscore the challenges that lie ahead.

    By July 25, 2023