Strategy: Page 16


  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    Cybersecurity Dive asked CISOs and other cyber experts what they do with their passwords. Here’s how they manage the mess that awaits us all.

    By May 4, 2023
  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Most open source maintainers still consider themselves hobbyists, despite compensation pledges

    A study by Tidelift shows a compensation gap for the key producers of open source applications, raising questions about how to properly secure software supply chains.

    By May 2, 2023
  • Lee Klarich, chief product officer at Palo Alto Networks, on stage at RSA Conference 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Cybersecurity pros plant seeds of hope at RSA Conference

    Optimism floated on the surface during the annual industry gathering. For one keynote on stage, it was the central theme.

    By May 2, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Mandiant CEO Kevin Mandia on stage at RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Mandiant CEO’s 7 tips for cyber defense

    Organizations’ institutional knowledge is an advantage that no adversary can match, Kevin Mandia told RSA Conference attendees.

    By April 28, 2023
  • Image shows a hand on a dial emblazoned with the word risk.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Global cyber insurance prices continue to moderate in Q1

    Marsh data shows rate increases slowing, stemming in part from new entrants into the cyber insurance market and fewer ransomware attacks in 2022.

    By April 27, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    IT managers uneasy with snooping software: report

    Surveillance tools may cause an uptick in staff attrition and make hiring more difficult, a 1E survey found. 

    By Roberto Torres • April 25, 2023
  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

    By April 21, 2023
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    3CX has a 7-part plan to shore up its security

    The company is planning significant security upgrades and changes to network operations after a historic attack from a state-linked actor.

    By April 20, 2023
  • Image of a modern computer keyboard with insurance button on a blue background and copy space.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Cyber insurance premium hikes slowed in 2022, Fitch says

    The deceleration was driven by a moderation of ransomware incidents and heightened levels of cyber risk awareness among corporate executives, the credit rating agency said.

    By Alexei Alexis • April 18, 2023
  • The words, "ChatGPT" appear on a multicolored background
    Image attribution tooltip
    chaofann via Getty Images
    Image attribution tooltip

    ChatGPT prompts experts to consider AI’s mark on cybersecurity

    Previous AI advancements in cybersecurity tools and practices could be a precursor of what’s to come.

    By April 18, 2023
  • A stylized stock chart is superimposed over a picture of U.S. dollars.
    Image attribution tooltip
    Maximusnd via Getty Images
    Image attribution tooltip

    Cyber venture capital funding slows to a trickle, a sharp decline from 2022 investment

    Funding declined 58% year-over-year in Q1, though this quarter marked a slight increase from Q4 2022.

    By April 14, 2023
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort to promote secure by design is seen as a potential game changer for software security, but may require substantial investments and considerable cultural changes.

    By April 14, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Explore the core tactics of secure by design and default

    The international joint guide encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design and best practices for default security measures at large.

    By April 13, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA, partner agencies unveil secure by design principles in historic shift of software security

    Authorities are engaging key stakeholders, but there is a broad understanding that these proposed changes will require massive changes in industry culture.

    By Updated April 13, 2023
  • CISA Director Jen Easterly talks with CEO George Kurtz during the CrowdStrike Government Summit.
    Image attribution tooltip
    Permission granted by CrowdStrike
    Image attribution tooltip

    CISA to unveil secure-by-design principles this week amid push for software security

    The Biden administration plans to shift responsibility for product safety to the tech industry. Stakeholder discussions are already underway.  

    By April 12, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an identity and access management system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By April 12, 2023
  • Abstract planet made up of squares.
    Image attribution tooltip
    Gegham Qalajyan via Getty Images
    Image attribution tooltip

    3CX threat actor named as company focuses on security upgrades, customer retention

    Mandiant attributed the supply chain attack to a North Korea-linked adversary that targeted systems using Windows-based malware.

    By April 12, 2023
  • The White House in Washington DC at summer day.
    Image attribution tooltip
    lucky-photographer via Getty Images
    Image attribution tooltip

    Biden cyber officials see auto, food safety as models for security overhaul

    The push to hold technology stakeholders liable for secure-by-design products will be a multiyear effort likely to involve Congress, the acting national cyber director said.

    By April 10, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By April 6, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Experts warn against ransomware complacency

    Despite reports of fewer ransomware-related cyber insurance claims and decelerating premiums in 2022, experts say the threat is still serious and evolving.

    By Alexei Alexis • April 3, 2023
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Marsh brokerage program lowers threshold for cyber insurance coverage

    Cyber Pathway aims to match organizations with insurance providers and also encourage businesses to improve their controls to get better coverage.

    By March 29, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines the capabilities of OpenAI's generative AI with Microsoft's threat intelligence and security network.  

    By March 28, 2023