Strategy: Page 25


  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Behind the push to finally eliminate passwords

    The FIDO Alliance is pushing for smartphones to become the authentication standard as the tech industry presses for new methods. 

    By Lance Whitney • April 20, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    marchmeena29 via Getty Images
    Image attribution tooltip
    Sponsored by Hyperproof

    How to advocate for your security, compliance and risk management program

    Feel like your compliance and security team could be better supported? Follow these five best practices to ensure your team gets the resources they need from leadership.

    April 18, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    2 years later: What's next in security for the pandemic-era workforce

    Organizations can expect the return-to-work model to stress a corporate infrastructure that has languished in recent years. 

    By Sue Poremba • April 13, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Datto, SailPoint acquired for more than $6B each amid growing cyber consolidation

    Buyers Kaseya and Thoma Bravo join the feeding frenzy a month after Google’s $5.4 billion deal to buy Mandiant.

    By April 11, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip
    Opinion

    Midsize enterprises: Strengthen security for today's threat landscape

    Midsize enterprises must protect against the same security threats as larger organizations, but with smaller budgets and fewer IT resources.

    By Paul Furtado • April 4, 2022
  • The Kronos outage disrupted one employer's payroll for more than a month. Here's how it moved forward.

    UMass Memorial Health had to quickly improvise to run payroll for more than 16,000 employees without hours-worked data, CFO Sergio Melgar said. 

    By Ryan Golden • March 24, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft rolls out security red carpet for competitors' cloud customers

    With a cloud-agnostic security tool in hand, Microsoft is vying to support customers' multicloud strategies. 

    By Barbara DeLollis • March 23, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Company signage outside Google's offices in Germany
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Dinner is served: Cyber M&A feeding frenzy shows hunger for trust

    Google's $5.4 billion bid for Mandiant was just one of 200-plus cybersecurity deals last year.

    By Naomi Eide • March 17, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CrowdStrike shares surge on strong Q4 earnings and robust annual forecast

    The cybersecurity firm reported a blockbuster Q4 a day after rival Mandiant was acquired by Google.  

    By March 10, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google swoops in to buy Mandiant for $5.4B after weeks of market speculation

    The deal follows reported negotiations between Microsoft and the incident response specialist, which sold off its FireEye products business last year.

    By Updated March 8, 2022
  • A person works from home
    Image attribution tooltip
    FreshSplash via Getty Images
    Image attribution tooltip

    How HR can prepare for a cyberattack

    Incurring some risk is the nature of business, but backup plans and cybersecurity training are key.

    By Caroline Colvin • March 4, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Security hampers enterprise cloud adoption: report

    Multicloud adoption adds complexity as IT security teams struggle with alert fatigue.

    By Feb. 22, 2022
  • Xe-100 reactor
    Image attribution tooltip
    Courtesy of X-energy
    Image attribution tooltip

    Cyber insurance premiums soar for energy companies

    Global politics and ransomware are driving insurance cost increases, more than doubling rates for some independent power producers. 

    By Robert Walton • Feb. 18, 2022
  • Close up stock photograph of a mature man working with a large computer screen. He’s working with 3D software examining complicated shapes.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    Cybersecurity outlook for 2022

    Nation-state cyberthreats and Log4j have the security community on high alert; organizations need to master response and remediation.  

    By Naomi Eide • Feb. 14, 2022
  • Kevin Mandia, CEO, Mandiant, keynote during the Mandiant Cyber Defense Summit 2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    Mandiant stock jumps on takeover report as incident responder swings to Q4 profit

    After divesting FireEye Products, Mandiant has a streamlined portfolio, but expansion will be expensive. 

    By Naomi Eide • Feb. 9, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    Security strategies evolve while spending flatlines

    Organizations want more bang for their buck, which can mean eschewing single-use products. 

    By Brian Eastwood • Feb. 8, 2022
  • Image attribution tooltip

    iStock/Guirong Hao

    Image attribution tooltip
    Sponsored by Keeper Security

    Smart cybersecurity budgeting in the age of ransomware

    Cut through the noise and learn how organizations can optimize their cybersecurity spend.

    Feb. 7, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Cybersecurity tool trends to watch in 2022

    For enterprises, the security priority remains doing more with less and finding tools that offer greater areas of coverage and integration.

    By Sue Poremba • Jan. 27, 2022
  • Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Biden gives defense, intel agencies 180 days to apply MFA, encryption

    The White House's memorandum builds on past requirements to bolster U.S. cyber standards. This time, the administration is targeting agencies that handle classified intelligence. 

    By Samantha Schwartz • Jan. 20, 2022
  • Hands type on a laptop keyboard, screen shows a software editor
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Extracting portions of open source in software development threatens app security

    While companies employ safeguards to detect flaws in applications, the likelihood of organizations running a complete database of all the places a vulnerability lives is slim.

    By Samantha Schwartz • Jan. 19, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    Can SOAR technology help SOCs regain the advantage in threat detection?

    Google's acquisition of Siemplify has placed a focus on whether automation can help restore balance in the fight against sophisticated attackers.

    By Jan. 7, 2022
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Congressional cyber commission expires but work to continue with 'Solarium 2.0'

    Despite the commission's success, unfinished business includes setting up a joint collaborative environment, institutionalizing the Cyber Diplomacy Act, creating a bureau of cyber statistics, and codifying critical infrastructure.

    By Samantha Schwartz • Dec. 23, 2021
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Security teams prepare for the yearslong threat Log4j poses

    Industry is still investigating the full extent of the vulnerability, which limits the actions security teams can immediately take. 

    By Samantha Schwartz • Dec. 16, 2021