Strategy: Page 18


  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Danai Jetawattana via Getty Images
    Image attribution tooltip

    3CX has a 7-part plan to shore up its security

    The company is planning significant security upgrades and changes to network operations after a historic attack from a state-linked actor.

    By April 20, 2023
  • Image of a modern computer keyboard with insurance button on a blue background and copy space.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Cyber insurance premium hikes slowed in 2022, Fitch says

    The deceleration was driven by a moderation of ransomware incidents and heightened levels of cyber risk awareness among corporate executives, the credit rating agency said.

    By Alexei Alexis • April 18, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • The words, "ChatGPT" appear on a multicolored background
    Image attribution tooltip
    chaofann via Getty Images
    Image attribution tooltip

    ChatGPT prompts experts to consider AI’s mark on cybersecurity

    Previous AI advancements in cybersecurity tools and practices could be a precursor of what’s to come.

    By April 18, 2023
  • A stylized stock chart is superimposed over a picture of U.S. dollars.
    Image attribution tooltip
    Maximusnd via Getty Images
    Image attribution tooltip

    Cyber venture capital funding slows to a trickle, a sharp decline from 2022 investment

    Funding declined 58% year-over-year in Q1, though this quarter marked a slight increase from Q4 2022.

    By April 14, 2023
  • legal processes
    Image attribution tooltip
    Nico ElNino via Getty Images
    Image attribution tooltip

    Software industry leaders debate real costs and benefits of CISA security push

    The global effort to promote secure by design is seen as a potential game changer for software security, but may require substantial investments and considerable cultural changes.

    By April 14, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Explore the core tactics of secure by design and default

    The international joint guide encapsulates security recommendations long-touted by CISA, including technical tactics for software and infrastructure design and best practices for default security measures at large.

    By April 13, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA, partner agencies unveil secure by design principles in historic shift of software security

    Authorities are engaging key stakeholders, but there is a broad understanding that these proposed changes will require massive changes in industry culture.

    By Updated April 13, 2023
  • CISA Director Jen Easterly talks with CEO George Kurtz during the CrowdStrike Government Summit.
    Image attribution tooltip
    Permission granted by CrowdStrike
    Image attribution tooltip

    CISA to unveil secure-by-design principles this week amid push for software security

    The Biden administration plans to shift responsibility for product safety to the tech industry. Stakeholder discussions are already underway.  

    By April 12, 2023
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    How Target approaches identity and access management

    Designing an identity and access management system that provides a good user experience while preventing unauthorized access is a critical responsibility.

    By April 12, 2023
  • Abstract planet made up of squares.
    Image attribution tooltip
    Gegham Qalajyan via Getty Images
    Image attribution tooltip

    3CX threat actor named as company focuses on security upgrades, customer retention

    Mandiant attributed the supply chain attack to a North Korea-linked adversary that targeted systems using Windows-based malware.

    By April 12, 2023
  • The White House in Washington DC at summer day.
    Image attribution tooltip
    lucky-photographer via Getty Images
    Image attribution tooltip

    Biden cyber officials see auto, food safety as models for security overhaul

    The push to hold technology stakeholders liable for secure-by-design products will be a multiyear effort likely to involve Congress, the acting national cyber director said.

    By April 10, 2023
  • Trade secrets
    Image attribution tooltip
    ridvan_celik via Getty Images
    Image attribution tooltip

    IT security leaders still told to keep data breaches quiet, study finds

    Bitdefender research found 7 in 10 IT and security professionals in the U.S. have been asked to keep a breach confidential.

    By April 6, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Experts warn against ransomware complacency

    Despite reports of fewer ransomware-related cyber insurance claims and decelerating premiums in 2022, experts say the threat is still serious and evolving.

    By Alexei Alexis • April 3, 2023
  • Programming scripts on laptop monitor, unauthorized remote hacking of server
    Image attribution tooltip
    Motortion via Getty Images
    Image attribution tooltip

    Marsh brokerage program lowers threshold for cyber insurance coverage

    Cyber Pathway aims to match organizations with insurance providers and also encourage businesses to improve their controls to get better coverage.

    By March 29, 2023
  • Microsoft Security Copilot threat hunting.
    Image attribution tooltip
    Permission granted by Microsoft
    Image attribution tooltip

    Microsoft unveils Security Copilot built on GPT-4

    The technology combines the capabilities of OpenAI's generative AI with Microsoft's threat intelligence and security network.  

    By March 28, 2023
  • Image of SEC seal on the side of a building.
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip
    Opinion

    The proposed SEC cyber incident disclosure rule is a positive change. But it won’t make organizations safer.

    If organizations want to actually get serious about protecting themselves, they need to have a robust system for handling incidents when they happen.

    By Frank Shultz • March 27, 2023
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    5 steps organizations can take to counter IAM threats

    Many organizations lean on identity and access management tools to perform credential management and authentication. But these systems aren’t foolproof.

    By March 24, 2023
  • The Google logo adorns the outside of their NYC office Google Building 8510 at 85 10th Ave on June 3, 2019
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Threat intelligence isn’t for everyone, Google says

    Most security professionals don’t have the time to read a 10-page threat intelligence report, let alone put those insights into action.

    By March 23, 2023
  • A series of hexagonal blocks with locks on them, one of which is broken, with a red background.
    Image attribution tooltip
    Andrii Yalanskyi via Getty Images
    Image attribution tooltip

    Ill-prepared against cyberattacks? You’re not alone, Cisco says

    The cybersecurity readiness gap looms large, and smaller organizations were ranked the least prepared.

    By March 22, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Ransomware gangs incite fear in victims to fuel attacks

    Attacks involving data theft nearly doubled and harassment spiked 20 times by late 2022, Palo Alto Networks Unit 42 said.

    By March 21, 2023
  • Group of Professionals Meeting in Modern Office
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security drives software purchases for half of US companies

    The study from Capterra comes weeks after the U.S. rolled out plans to shift liability for weak product security onto the tech industry.

    By March 20, 2023
  • 100 dollar bills with green streaks spiraling around them and 0s and 1s in the background
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Global cybersecurity spending to top $219B this year: IDC

    Persistent cyberattack threats, increased regulations and the demands of hybrid work are driving sustained growth.

    By March 17, 2023
  • Silhouette of teams playing tug of war
    Image attribution tooltip
    Chris Gorgio via Getty Images
    Image attribution tooltip

    Cybersecurity market confronts potential consequences of banking crisis

    Bank seizures impose new challenges on vendors in every segment and may spur consolidation.

    By March 16, 2023
  • Employees stand outside of the shuttered Silicon Valley Bank (SVB) headquarters on March 10, 2023 in Santa Clara, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    SVB turmoil could mean long-term uncertainty for enterprise IT

    The demise of Silicon Valley Bank created a void in tech startup funding and raises questions about the health of the vendor ecosystem.

    By Matt Ashare • March 14, 2023
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    Shift to secure-by-design must start at university level, CISA director says

    Jen Easterly says secure coding and memory safety should be incorporated into computer science curriculum. 

    By March 13, 2023