Strategy: Page 17


  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs still expect cyber budget increases amid economic pressure

    A study from Nuspire shows CISOs continue to focus on maximizing value as they seek more efficient and simplified security posture.

    By June 1, 2023
  • A stack of books sits on a desk alongside chalk, eraser, a pencil holder and backpack. A red apple sits on top of the stacked books.
    Image attribution tooltip
    Atstock Productions via Getty Images
    Image attribution tooltip

    Only one-third of school districts have a full-time employee dedicated to cybersecurity

    For the last six years, cybersecurity has continued to be a top concern for ed tech leaders, according to a survey by the Consortium for School Networking.

    By Anna Merod • June 1, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks teases plans for generative AI across security services

    The security vendor is taking a restrained approach to deploying generative AI products, but the company’s leaders still believe the technology will herald a major shift for cybersecurity.

    By May 31, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    PyPI to mandate 2FA by the end of 2023

    The mandate is part of a larger effort to prevent account takeover attacks.

    By May 30, 2023
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    AndreyPopov via Getty Images
    Image attribution tooltip

    Why cyber is also a CIO problem

    When an incursion occurs, IT teams need to have a recovery plan and backup systems ready for deployment.

    By Matt Ashare • May 25, 2023
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    CISA updates ransomware guide 3 years after its debut

    The #StopRansomware guide, updated in partnership with the FBI, NSA and MS-ISAC, reflects aggressive new techniques used by threat actors, including double extortion.

    By May 24, 2023
  • Login information attached to large hook hanging in front of computer keyboard.
    Image attribution tooltip
    Philip Steury via Getty Images
    Image attribution tooltip

    BEC attacks rise as criminal hackers employ new tactics to evade detection

    Threat actors are using cybercrime as a service to grow industrial strength campaigns and leveraging residential IP addresses.

    By May 23, 2023
  • Coin Stacks Sitting on A Blue Financial Graph Background
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    IT security budgets are shifting as companies target risk reduction

    Organizations are designing their security spending around keeping the business secure and operations running smoothly.

    By Sue Poremba • May 22, 2023
  • Coin stacks sitting on blue financial graph background.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Critical infrastructure security spending to grow 83% by 2027: ABI Research

    Analysts forecast cybersecurity spending among critical infrastructure organizations to grow from an estimated $129 billion in 2022 to almost $236 billion by 2027.

    By May 19, 2023
  • Teacher Giving Computer Science Lecture to Diverse Multiethnic Group of Female and Male Students in Dark College Room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber resilience programs falling short on preparing workers for a crisis

    The report from Immersive Labs raises questions about whether corporate employees would know how to respond after a major cyberattack.

    By May 18, 2023
  • Cybercriminal experts assemble in conference room.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Why and how to report a ransomware attack

    The majority of ransomware attacks go unreported, creating a blind spot that hampers response, recovery efforts and the prevention of future attacks.

    By May 18, 2023
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Flood of ransom payments continues as officials mull ban

    The revived debate over the viability of a ransom payment ban comes down to the cost ransomware is causing organizations globally.

    By May 11, 2023
  • Woman and a man standing on stage in front of a screen that says Hack the Capitol
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    CISA director wary of technology industry repeating its mistakes with AI

    The multibillion-dollar cybersecurity industry is the result of misaligned incentives, where speed-to-market outranked security, Jen Easterly said. 

    By Naomi Eide • May 11, 2023
  • Hooded person types on computer in a dark room with multiple monitors and cables everywhere.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware insurance claims jump back up

    Ransomware claims filed by U.S. clients of insurance broker Marsh spiked 77% in the first quarter, following a downward trend in 2022.

    By Alexei Alexis • May 10, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    Google, Dashlane separately move to eliminate passwords

    In unrelated moves, the companies highlighted a growing effort to phase out dependence on passwords amid a rise in phishing attacks.

    By May 4, 2023
  • Password input field
    Image attribution tooltip
    Getty via Getty Images
    Image attribution tooltip

    How 7 cybersecurity experts manage their passwords

    Cybersecurity Dive asked CISOs and other cyber experts what they do with their passwords. Here’s how they manage the mess that awaits us all.

    By May 4, 2023
  • Exterior of the Moscone Center during the RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Companies need a wakeup call to fix chronic security shortcomings, cyber experts say

    One researcher wonders if the industry needs another Snowden-like moment to spring organizations into action.

    By May 3, 2023
  • Merck sign
    Image attribution tooltip
    Marko Georgiev / Stringer via Getty Images
    Image attribution tooltip

    Merck cyber coverage upheld in NotPetya decision, seen as victory for policyholders

    A court victory in the closely watched insurance case is expected to stabilize a turbulent market and provide some assurance for organizations amid a rise in nation-state activity.

    By May 3, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Most open source maintainers still consider themselves hobbyists, despite compensation pledges

    A study by Tidelift shows a compensation gap for the key producers of open source applications, raising questions about how to properly secure software supply chains.

    By May 2, 2023
  • Lee Klarich, chief product officer at Palo Alto Networks, on stage at RSA Conference 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Cybersecurity pros plant seeds of hope at RSA Conference

    Optimism floated on the surface during the annual industry gathering. For one keynote on stage, it was the central theme.

    By May 2, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Organizations are boosting resilience, getting faster at incident response

    While the number of data security incidents remained level between 2021 and 2022, companies improved recovery thanks to stronger security measures, BakerHostetler found.

    By May 1, 2023
  • Mandiant CEO Kevin Mandia on stage at RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Mandiant CEO’s 7 tips for cyber defense

    Organizations’ institutional knowledge is an advantage that no adversary can match, Kevin Mandia told RSA Conference attendees.

    By April 28, 2023
  • Image shows a hand on a dial emblazoned with the word risk.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Global cyber insurance prices continue to moderate in Q1

    Marsh data shows rate increases slowing, stemming in part from new entrants into the cyber insurance market and fewer ransomware attacks in 2022.

    By April 27, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    IT managers uneasy with snooping software: report

    Surveillance tools may cause an uptick in staff attrition and make hiring more difficult, a 1E survey found. 

    By Roberto Torres • April 25, 2023
  • Digital background depicting innovative technologies in (AI) artificial systems, neural interfaces and internet machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Threat actors can use ChatGPT to sharpen cyberthreats, but no need to panic yet

    Startling dangers, such as autonomous attack mechanisms and sophisticated malware coding, have yet to materialize. For now, the threat is more specific.

    By April 21, 2023