Strategy: Page 20


  • Law flat icon on wooden block cube with calculator and pencil on dollar bank note money,
    Image attribution tooltip
    grapestock via Getty Images
    Image attribution tooltip

    Surging cyberthreats, data concerns remain top dispute risks for organizations

    A survey from Baker McKenzie shows a heightened risk of legal challenges amid a rise in sophisticated cyberattacks, along with concerns about the regulatory response. 

    By Jan. 12, 2023
  • The T-Mobile logo is displayed outside of a T-Mobile store on April 24, 2017 in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    T-Mobile CSO: One wrong decision can wreak havoc

    Adversaries attacked a T-Mobile honeypot 65 million times a day, Timothy Youngblood recalls.

    By Jan. 11, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Beazley launches historic $45M cyber catastrophe bond

    The announcement marks the first time an insurance-linked securities instrument has been created to cover catastrophic cyber risk. 

    By Jan. 10, 2023
  • Rajeev Chand, partner and head of research at Wing Venture Capital, CrowdStrike CEO George Kurtz and CISA Director Jen Easterly (left to right) discuss cybersecurity challenges on a CES panel in Las V
    Image attribution tooltip

    CES

    Image attribution tooltip

    Tech priorities out of sync with security needs, CISA director says

    As long as priorities and incentives are misaligned, security and safety needs will remain unmet. “We can’t just let technology off the hook,” Jen Easterly said.

    By Jan. 9, 2023
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    6 security experts on what cyberthreats they expect in 2023

    Organizations will keep a close eye on geopolitical tension and supply chain attacks. But at the core, the biggest threats are built on mistakes.

    By Naomi Eide , , Jan. 6, 2023
  • Lights in Europe are seen from space.
    Image attribution tooltip
    DKosig/iStock via Getty Images
    Image attribution tooltip

    Cybersecurity trends in 2023 that will directly impact everyday life

    The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security. 

    By Sue Poremba • Jan. 3, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Remote, third-party workers raise security risks for enterprises: report

    A study on behalf of Talon shows third-party contractors are often engaged in risky behavior, using unmanaged devices or high-risk desktop technologies. 

    By Dec. 21, 2022
  • Workers at a security operations center at Rackspace.
    Image attribution tooltip
    Courtesy of Rackspace Technology
    Image attribution tooltip

    Apple CIO steps down from Rackspace board citing new job duties

    Rackspace announced additional management changes while it recovers from a ransomware attack on its Hosted Exchange business. 

    By Dec. 19, 2022
  • An illustrated computer with security symbols, including a person in a face mask holding a fishing pole with things representing PII dislpayed.
    Image attribution tooltip
    bagira22 via Getty Images
    Image attribution tooltip
    Opinion

    How to upgrade cybersecurity awareness training

    Phishing attacks are not always as obvious as a direct message from someone pretending to be Elon Musk asking you to buy cryptocurrency. To better equip employees, cyber training needs an upgrade. 

    By James Karimi • Dec. 12, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google stresses unmet need for software supply chain security

    The open source software ecosystem remains vulnerable, and fragmented efforts could stifle progress, according to Google.

    By Dec. 8, 2022
  • The Apple logo is displayed on the exterior of an Apple Store.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Apple expands iCloud encryption, boosts MFA with security keys

    Additional security features could prevent phishing scams and lower exposure for companies that let workers use personal devices for work.

    By Dec. 8, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft taps security demand to drive M365 amid fragmented market

    A top company executive said a key driver is to bundle its cybersecurity capabilities with office productivity applications, as customers look to consolidate vendors.

    By Dec. 7, 2022
  • Diverse employees team engaged in teamwork in modern boardroom
    Image attribution tooltip
    fizkes via Getty Images
    Image attribution tooltip

    What does it take to be good at cybersecurity?

    Few large enterprises meet Deloitte’s standards for high cyber maturity. The 21% that do recognize benefits not typically associated with security.

    By Dec. 7, 2022
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D.
    Image attribution tooltip
    piranka via Getty Images
    Image attribution tooltip

    7 of this year’s biggest cybersecurity stories

    From vendor evolution to the long-term effects of high-profile attacks, the cybersecurity industry is rapidly evolving. Take a look at our top stories to understand just how much has changed.

    By Naomi Eide • Dec. 5, 2022
  • AWS CEO Adam Selipsky
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images
    Image attribution tooltip

    AWS builds a lake for multivendor security data sharing

    Security data is scattered and often stored in fragments from multiple sources. AWS wants to centralize that in a single data lake.

    By Dec. 2, 2022
  • Uncut sheet of U.S. $100 bills
    Image attribution tooltip
    eranicle/iStock via Getty Images
    Image attribution tooltip

    CrowdStrike CEO: SMB deals delayed as enterprises hold firm on cyber spend

    Fears of a recession are impacting the cybersecurity investments of smaller organizations and enterprises in different ways, George Kurtz said.

    By Dec. 1, 2022
  • A sign is posted in front of a Walmart store on November 16, 2021 in American Canyon, California.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Walmart security, operating at a vast scale, turns to automation

    Security operations centers, part of Walmart Global Tech, process 6 trillion data points each year, a feat unattainable through manual methods. 

    By Naomi Eide • Nov. 30, 2022
  • AWS CEO Adam Selipsky
    Image attribution tooltip
    Noah Berger/Getty Images via Getty Images
    Image attribution tooltip

    AWS CEO stresses the core elements of cloud security

    Adam Selipsky described security as a prerequisite for organizations to trust cloud infrastructure. And for that, he claimed, AWS is the best in the game.

    By Nov. 30, 2022
  • Bright AWS signage hangs over a trade show floor, attendees walking by in the foreground
    Image attribution tooltip
    Noah Berger/Getty Images for Amazon Web Services via Getty Images
    Image attribution tooltip
    Deep Dive

    Where is AWS in the cybersecurity conversation?

    The cloud leader doesn’t emphasize security and share information at the same level as its competitors. Experts say that's by design.

    By Nov. 29, 2022
  • Pedestrians walk beside a stone wall with gilded letters spelling out "14 Wall Street."
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    As companies tighten tech spend, demand for cybersecurity services grows

    Managed service providers can help fill talent needs and tame costs, but that strategy may require additional risk mitigation.

    By Suman Bhattacharyya • Nov. 28, 2022
  • Image attribution tooltip
    Mark Wilson/Staff via Getty Images
    Image attribution tooltip

    Defense Department launches zero trust, phasing out perimeter defense strategy

    Private sector partners say the rollout will raise the security bar to better protect the entire defense industry ecosystem.

    By Nov. 23, 2022
  • skeleton of a mastodon
    Image attribution tooltip
    Thomas Lohnes/Getty Images via Getty Images
    Image attribution tooltip

    Growing Mastodon security community grapples with CISA impersonators

    An infosec.exchange account impersonating CISA Director Jen Easterly was suspended by the Mastodon instance administrator Monday, as the security community searches for a Twitter alternative.

    By Nov. 23, 2022
  • In-house IT training session upskills workforce
    Image attribution tooltip
    Jovanmandic via Getty Images
    Image attribution tooltip

    Security awareness training needs a revamp

    Too often security training is seen as a negative experience and a time to reprimand those who make security gaffes. But old strategies aren’t working. It’s time for a redo. 

    By Sue Poremba • Nov. 22, 2022
  • Highway sign with the word "recession next exit" on it.
    Image attribution tooltip
    ZargonDesign via Getty Images
    Image attribution tooltip

    Tech sector execs see potential recession as a business opportunity

    Technology company leaders are preparing for economic downturn by investing selectively in the workforce and new technologies, according to EY survey.

    By Matt Ashare • Nov. 21, 2022
  • Twitter logo depicted over photo of individual.
    Image attribution tooltip
    Leon Neal/Getty Images via Getty Images
    Image attribution tooltip

    Where will the security community turn, if not Twitter?

    A consistent stream of credibility hits could cause lasting damage for cybersecurity and those who flock there.

    By Nov. 21, 2022