Strategy: Page 8


  • Developer coding and programming on two with screens.
    Image attribution tooltip
    valentinrussanov via Getty Images
    Image attribution tooltip

    Nearly 1 in 3 software development professionals unaware of secure practices

    The knowledge gap, identified in a Linux Foundation report, comes as malicious hackers increasingly target critical vulnerabilities.

    By July 16, 2024
  • Young businessman working alone at his desk on desktop computer in an open space modern coworking office.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    Risk escalates as communication channels proliferate

    The chance of losing data to a breach rises in tandem with the number of channels — like email and file sharing — that an organization uses.

    By Robert Freedman • July 10, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake allows admins to enforce MFA as breach investigations conclude

    Three months after an attacker targeted more than 100 customer environments, Snowflake is making it easier for existing customers to enforce MFA, but it isn’t requiring it.

    By July 9, 2024
  • A team of laboratory technicians conduct a series of tests on a chemical analyzer in a biological laboratory.
    Image attribution tooltip

    istockphoto.com/illustrissima

    Image attribution tooltip
    Sponsored by CybelAngel

    3 key lessons for CISOs from recent medical cyber quakes

    Medical-grade breaches result in casualties all around. So, what can be done to push back?

    July 8, 2024
  • Macquarie v Moab
    Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    Supreme Court ruling on Chevron doctrine may upend future cybersecurity regulation

    Experts expect new legal challenges against numerous agency cybersecurity requirements, including incident reporting mandates and rules governing critical infrastructure sectors.

    By Updated July 8, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft alerts additional customers of state-linked threat group attacks

    The company told customers the Midnight Blizzard attacks disclosed in January were more widespread than previously known.

    By June 28, 2024
  • Pumpjack in Fort Stockton, Texas.
    Image attribution tooltip
    Brandon Bell/Getty Image via Getty Images
    Image attribution tooltip

    Industrial cyberattacks fuel surge in OT cybersecurity spending

    Operators in mining, oil and gas, utilities and manufacturing are among the top spenders, according to ABI Research.

    By June 28, 2024
  • A person goes over insurance options
    Image attribution tooltip
    time99lek via Getty Images
    Image attribution tooltip

    Cyber insurance terms drive companies to invest more in security, report finds

    Though recovery costs continue to outpace coverage, companies are investing in network security to lower premiums and yield better policy terms.

    By June 26, 2024
  • A male IT specialist holds a laptop and discusses work with a female server technician in a data center, standing before a rack server cabinet with a cloud server icon and visualization.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cloud security becoming top priority for companies worldwide

    Application sprawl and the sensitive nature of the data organizations place in the cloud is complicating security, Thales found.

    By June 25, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip

    Ransomware victims are becoming less likely to pay up

    Despite a jump in ransom demands last year, companies are plotting better defenses against attacks that can incur deep business interruption costs, Marsh said.

    By Justin Bachman • June 21, 2024
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    MFA plays a rising role in major attacks, research finds

    Poor configurations and deliberate MFA bypasses were at the center of numerous attacks in recent months, Cisco Talos found.

    By June 18, 2024
  • A close up of a man in a blue suit with a multicolored tie gesturing while seated at a desk.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft president promises significant culture changes geared towards security

    Brad Smith detailed plans to tie compensation to security, as lawmakers raised new questions about the company’s commitment to transparency.

    By June 14, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft will take full ownership for security failures in House testimony

    Brad Smith, the company’s vice chair and president, will acknowledge extensive security lapses while outlining steps the company, industry and nation need to move forward.

    By June 13, 2024
  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    Snowflake-linked attacks are testing the cloud’s shared responsibility status quo

    Assigning responsibility for missing security controls is tricky. The burden is collective but cloud providers need to raise minimum standards, experts say.

    By June 13, 2024
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Rust Foundation leads the charge to improve critical systems security

    The foundation is standing up a consortium to boost the responsible use of the programming language at a time of heightened security risks.

    By June 12, 2024
  • Customers queue outside the Apple Store in Milan on September 22, 2023 in Milan, Italy.
    Image attribution tooltip
    Ming Yeung via Getty Images
    Image attribution tooltip

    Apple makes a password manager play in a heavily targeted market

    The new, standalone app Passwords places credential management front and center for Apple’s massive user base.

    By June 11, 2024
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Telecom, media and tech companies are cyber defense standouts: Moody’s

    Cybersecurity spending in the sector doubled during the past five years, accounting for 10% of companies’ technology budgets in 2023, the credit ratings and research firm said.

    By June 7, 2024
  • Liat Hayun, co-founder and CEO, Eureka Security.
    Image attribution tooltip
    Permission granted by Eureka Security
    Image attribution tooltip

    Tenable to acquire Eureka Security for greater visibility into cloud data environment

    The deal marks the latest acquisition in a market undergoing pricing adjustments and increased pressure to offer unified platforms.

    By June 6, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike soars above industry spending concerns, digs at rivals

    The cybersecurity firm defied growing industry pressures on cybersecurity revenue while continuing to jab rivals Microsoft and Palo Alto Networks. 

    By June 5, 2024
  • A group of three software developers converse in an office setting
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security concerns mount as businesses deploy AI coding tools

    Organizations are deploying the technology without enough protocols to ensure safe, secure use.

    By Lindsey Wilkinson • June 5, 2024
  • cybersecurity, talent shortage, retention, leadership
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip
    Opinion

    How to identify and implement security automation use cases

    It might be a “fun” engineering challenge to see what is possible to automate, but often the results will not justify the expense and effort, Gartner’s Kevin Schmidt writes.

    By Kevin Schmidt • June 4, 2024
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip
    Sponsored by Avaya

    Securing your call centers: Best practices for cybersecurity protection

    All call centers face cybersecurity threats because they handle information like credit card numbers, health records, and personal purchase history. However, call centers that support federal agencies have the added risk of handling highly sensitive information, making them prime targets for cybercriminals.

    By Jerry Dotson, Vice President of Public Sector, Avaya • June 3, 2024
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    NIST has a plan to clear the vulnerability analysis backlog

    The Cybersecurity and Infrastructure Security Agency and government contractor Analygence will help clear the National Vulnerability Database backlog.

    By May 31, 2024
  • Silhouette of several business people at a conference room table.
    Image attribution tooltip
    FangXiaNuo via Getty Images
    Image attribution tooltip

    CISOs under pressure from boards to downplay cyber risk: study

    Research from Trend Micro shows tension between CISOs and senior enterprise leadership. Many security leaders say they're perceived as nags.

    By May 30, 2024
  • Okta office
    Image attribution tooltip
    Courtesy of Okta
    Image attribution tooltip

    Okta rides out cyberattack fallout with ‘minimal impact’

    CEO and Co-Founder Todd McKinnon said it’s going to take some time before Okta can put the cyberattack behind it.

    By May 30, 2024